Validation Output
```
[32m[1mSuccess![0m The configuration is valid.
[0m
```
Terraform Plan πsuccess
Show Plan
```diff
module.cluster.module.aks_cluster.azurerm_resource_group.aks: Refreshing state... [id=/subscriptions/8f09f7f4-7b25-4d6f-88a5-847b1751c4ce/resourceGroups/rg-sandbox-tfpoc-cluster]
module.cluster.module.aks_cluster.azurerm_kubernetes_cluster.aks: Refreshing state... [id=/subscriptions/8f09f7f4-7b25-4d6f-88a5-847b1751c4ce/resourceGroups/rg-sandbox-tfpoc-cluster/providers/Microsoft.ContainerService/managedClusters/aks-sandbox-tfpoc]
module.feature.module.feature.azurerm_resource_group.feature: Refreshing state... [id=/subscriptions/8f09f7f4-7b25-4d6f-88a5-847b1751c4ce/resourceGroups/rg-sandbox-tfpoc-feature]
module.feature.module.feature.module.feature_key_vault.data.azurerm_client_config.current: Reading...
module.feature.module.feature.data.azurerm_key_vault_secret.test_secret: Reading...
module.feature.module.feature.module.feature_key_vault.data.azurerm_client_config.current: Read complete after 0s [id=Y2xpZW50Q29uZmlncy9jbGllbnRJZD1hNmFlYmEzMS03ODllLTRkZWMtYWEzMi01YmEyMDcyZTMwOWY7b2JqZWN0SWQ9YzU4YzRmNTMtNmViZS00NGQzLTgyMWItZDM3ZGVhYmI0YTFhO3N1YnNjcmlwdGlvbklkPThmMDlmN2Y0LTdiMjUtNGQ2Zi04OGE1LTg0N2IxNzUxYzRjZTt0ZW5hbnRJZD00ODc4ZTBjMS03MDE3LTQ2OGItODVmMy0zNjg2ZTEzMjZlNTM=]
module.feature.module.feature.module.feature_key_vault.azurerm_key_vault.vault: Refreshing state... [id=/subscriptions/8f09f7f4-7b25-4d6f-88a5-847b1751c4ce/resourceGroups/rg-sandbox-tfpoc-feature/providers/Microsoft.KeyVault/vaults/kv-sand-tfpoc-feature]
module.feature.module.feature.kubernetes_namespace.secret_namespace: Refreshing state... [id=sandbox]
module.feature.module.feature.data.azurerm_key_vault_secret.test_secret: Read complete after 0s [id=https://kv-sand-tfpoc-bootstrap.vault.azure.net/secrets/Test--Secret/faacf97fe9084e87a046b9c769a101e6]
Note: Objects have changed outside of Terraform
Terraform detected the following changes made outside of Terraform since the
last "terraform apply" which may have affected this plan:
# module.feature.module.feature.azurerm_resource_group.feature has changed
~ resource "azurerm_resource_group" "feature" {
id = "/subscriptions/8f09f7f4-7b25-4d6f-88a5-847b1751c4ce/resourceGroups/rg-sandbox-tfpoc-feature"
name = "rg-sandbox-tfpoc-feature"
+ tags = {}
# (1 unchanged attribute hidden)
}
# module.feature.module.feature.module.feature_key_vault.azurerm_key_vault.vault has changed
~ resource "azurerm_key_vault" "vault" {
id = "/subscriptions/8f09f7f4-7b25-4d6f-88a5-847b1751c4ce/resourceGroups/rg-sandbox-tfpoc-feature/providers/Microsoft.KeyVault/vaults/kv-sand-tfpoc-feature"
name = "kv-sand-tfpoc-feature"
+ tags = {}
# (13 unchanged attributes hidden)
# (1 unchanged block hidden)
}
Unless you have made equivalent changes to your configuration, or ignored the
relevant attributes using ignore_changes, the following plan may include
actions to undo or respond to these changes.
βββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ
Terraform used the selected providers to generate the following execution
plan. Resource actions are indicated with the following symbols:
+ create
Terraform will perform the following actions:
# module.feature.module.feature.azurerm_redis_cache.feature[0] will be created
+ resource "azurerm_redis_cache" "feature" {
+ capacity = 2
+ enable_non_ssl_port = false
+ family = "C"
+ hostname = (known after apply)
+ id = (known after apply)
+ location = "eastus"
+ minimum_tls_version = "1.2"
+ name = "rc-sandbox-tfpoc-feature"
+ port = (known after apply)
+ primary_access_key = (sensitive value)
+ primary_connection_string = (sensitive value)
+ private_static_ip_address = (known after apply)
+ public_network_access_enabled = true
+ redis_version = (known after apply)
+ replicas_per_master = (known after apply)
+ replicas_per_primary = (known after apply)
+ resource_group_name = "rg-sandbox-tfpoc-feature"
+ secondary_access_key = (sensitive value)
+ secondary_connection_string = (sensitive value)
+ sku_name = "Standard"
+ ssl_port = (known after apply)
+ redis_configuration {
+ enable_authentication = true
+ maxclients = (known after apply)
+ maxfragmentationmemory_reserved = (known after apply)
+ maxmemory_delta = (known after apply)
+ maxmemory_policy = "volatile-lru"
+ maxmemory_reserved = (known after apply)
}
}
# module.feature.module.feature.kubernetes_secret.cosmosdb-secret will be created
+ resource "kubernetes_secret" "cosmosdb-secret" {
+ data = (sensitive value)
+ id = (known after apply)
+ type = "Opaque"
+ wait_for_service_account_token = true
+ metadata {
+ generation = (known after apply)
+ name = "feature-secrets"
+ namespace = "sandbox"
+ resource_version = (known after apply)
+ uid = (known after apply)
}
}
Plan: 2 to add, 0 to change, 0 to destroy.
βββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ
Saved the plan to: tf.plan
To perform exactly these actions, run the following command to apply:
terraform apply "tf.plan"
```
Terraform Format and Style π
failure
Terraform Initialization βοΈ
success
Terraform Validation π€
success
Validation Output
``` [32m[1mSuccess![0m The configuration is valid. [0m ```Terraform Plan π
success
Show Plan
```diff module.cluster.module.aks_cluster.azurerm_resource_group.aks: Refreshing state... [id=/subscriptions/8f09f7f4-7b25-4d6f-88a5-847b1751c4ce/resourceGroups/rg-sandbox-tfpoc-cluster] module.cluster.module.aks_cluster.azurerm_kubernetes_cluster.aks: Refreshing state... [id=/subscriptions/8f09f7f4-7b25-4d6f-88a5-847b1751c4ce/resourceGroups/rg-sandbox-tfpoc-cluster/providers/Microsoft.ContainerService/managedClusters/aks-sandbox-tfpoc] module.feature.module.feature.azurerm_resource_group.feature: Refreshing state... [id=/subscriptions/8f09f7f4-7b25-4d6f-88a5-847b1751c4ce/resourceGroups/rg-sandbox-tfpoc-feature] module.feature.module.feature.module.feature_key_vault.data.azurerm_client_config.current: Reading... module.feature.module.feature.data.azurerm_key_vault_secret.test_secret: Reading... module.feature.module.feature.module.feature_key_vault.data.azurerm_client_config.current: Read complete after 0s [id=Y2xpZW50Q29uZmlncy9jbGllbnRJZD1hNmFlYmEzMS03ODllLTRkZWMtYWEzMi01YmEyMDcyZTMwOWY7b2JqZWN0SWQ9YzU4YzRmNTMtNmViZS00NGQzLTgyMWItZDM3ZGVhYmI0YTFhO3N1YnNjcmlwdGlvbklkPThmMDlmN2Y0LTdiMjUtNGQ2Zi04OGE1LTg0N2IxNzUxYzRjZTt0ZW5hbnRJZD00ODc4ZTBjMS03MDE3LTQ2OGItODVmMy0zNjg2ZTEzMjZlNTM=] module.feature.module.feature.module.feature_key_vault.azurerm_key_vault.vault: Refreshing state... [id=/subscriptions/8f09f7f4-7b25-4d6f-88a5-847b1751c4ce/resourceGroups/rg-sandbox-tfpoc-feature/providers/Microsoft.KeyVault/vaults/kv-sand-tfpoc-feature] module.feature.module.feature.kubernetes_namespace.secret_namespace: Refreshing state... [id=sandbox] module.feature.module.feature.data.azurerm_key_vault_secret.test_secret: Read complete after 0s [id=https://kv-sand-tfpoc-bootstrap.vault.azure.net/secrets/Test--Secret/faacf97fe9084e87a046b9c769a101e6] Note: Objects have changed outside of Terraform Terraform detected the following changes made outside of Terraform since the last "terraform apply" which may have affected this plan: # module.feature.module.feature.azurerm_resource_group.feature has changed ~ resource "azurerm_resource_group" "feature" { id = "/subscriptions/8f09f7f4-7b25-4d6f-88a5-847b1751c4ce/resourceGroups/rg-sandbox-tfpoc-feature" name = "rg-sandbox-tfpoc-feature" + tags = {} # (1 unchanged attribute hidden) } # module.feature.module.feature.module.feature_key_vault.azurerm_key_vault.vault has changed ~ resource "azurerm_key_vault" "vault" { id = "/subscriptions/8f09f7f4-7b25-4d6f-88a5-847b1751c4ce/resourceGroups/rg-sandbox-tfpoc-feature/providers/Microsoft.KeyVault/vaults/kv-sand-tfpoc-feature" name = "kv-sand-tfpoc-feature" + tags = {} # (13 unchanged attributes hidden) # (1 unchanged block hidden) } Unless you have made equivalent changes to your configuration, or ignored the relevant attributes using ignore_changes, the following plan may include actions to undo or respond to these changes. βββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ Terraform used the selected providers to generate the following execution plan. Resource actions are indicated with the following symbols: + create Terraform will perform the following actions: # module.feature.module.feature.azurerm_redis_cache.feature[0] will be created + resource "azurerm_redis_cache" "feature" { + capacity = 2 + enable_non_ssl_port = false + family = "C" + hostname = (known after apply) + id = (known after apply) + location = "eastus" + minimum_tls_version = "1.2" + name = "rc-sandbox-tfpoc-feature" + port = (known after apply) + primary_access_key = (sensitive value) + primary_connection_string = (sensitive value) + private_static_ip_address = (known after apply) + public_network_access_enabled = true + redis_version = (known after apply) + replicas_per_master = (known after apply) + replicas_per_primary = (known after apply) + resource_group_name = "rg-sandbox-tfpoc-feature" + secondary_access_key = (sensitive value) + secondary_connection_string = (sensitive value) + sku_name = "Standard" + ssl_port = (known after apply) + redis_configuration { + enable_authentication = true + maxclients = (known after apply) + maxfragmentationmemory_reserved = (known after apply) + maxmemory_delta = (known after apply) + maxmemory_policy = "volatile-lru" + maxmemory_reserved = (known after apply) } } # module.feature.module.feature.kubernetes_secret.cosmosdb-secret will be created + resource "kubernetes_secret" "cosmosdb-secret" { + data = (sensitive value) + id = (known after apply) + type = "Opaque" + wait_for_service_account_token = true + metadata { + generation = (known after apply) + name = "feature-secrets" + namespace = "sandbox" + resource_version = (known after apply) + uid = (known after apply) } } Plan: 2 to add, 0 to change, 0 to destroy. βββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ Saved the plan to: tf.plan To perform exactly these actions, run the following command to apply: terraform apply "tf.plan" ```Pusher: @spencerr Action:
workflow_dispatch
Working Directory:/home/runner/work/tf-poc/tf-poc/company-product/environments/sandbox
Workflow:Company:Product -> Terraform
Workflow is pending manual review. URL: https://github.com/spencerr/tf-poc/actions/runs/6329133685
Required approvers: [spencerr]
Respond "approved", "approve", "lgtm", "yes" to continue workflow or "denied", "deny", "no" to cancel.