spencerr / tf-poc

0 stars 0 forks source link

Manual approval required for workflow run 6329577864: Terraform destroy -> company-product (sandbox) #36

Closed github-actions[bot] closed 1 year ago

github-actions[bot] commented 1 year ago

Terraform Format and Style πŸ–Œfailure

Terraform Initialization βš™οΈsuccess

Terraform Validation πŸ€–success

Validation Output ``` Success! The configuration is valid.  ```

Terraform Plan πŸ“–success

Show Plan ```diff module.cluster.module.aks_cluster.azurerm_resource_group.aks: Refreshing state... [id=/subscriptions/8f09f7f4-7b25-4d6f-88a5-847b1751c4ce/resourceGroups/rg-sandbox-tfpoc-cluster] module.cluster.module.aks_cluster.azurerm_kubernetes_cluster.aks: Refreshing state... [id=/subscriptions/8f09f7f4-7b25-4d6f-88a5-847b1751c4ce/resourceGroups/rg-sandbox-tfpoc-cluster/providers/Microsoft.ContainerService/managedClusters/aks-sandbox-tfpoc] module.feature.module.feature.module.feature_key_vault.data.azurerm_client_config.current: Reading... module.feature.module.feature.azurerm_resource_group.feature: Refreshing state... [id=/subscriptions/8f09f7f4-7b25-4d6f-88a5-847b1751c4ce/resourceGroups/rg-sandbox-tfpoc-feature] module.feature.module.feature.data.azurerm_key_vault_secret.test_secret: Reading... module.feature.module.feature.module.feature_key_vault.data.azurerm_client_config.current: Read complete after 0s [id=Y2xpZW50Q29uZmlncy9jbGllbnRJZD1hNmFlYmEzMS03ODllLTRkZWMtYWEzMi01YmEyMDcyZTMwOWY7b2JqZWN0SWQ9YzU4YzRmNTMtNmViZS00NGQzLTgyMWItZDM3ZGVhYmI0YTFhO3N1YnNjcmlwdGlvbklkPThmMDlmN2Y0LTdiMjUtNGQ2Zi04OGE1LTg0N2IxNzUxYzRjZTt0ZW5hbnRJZD00ODc4ZTBjMS03MDE3LTQ2OGItODVmMy0zNjg2ZTEzMjZlNTM=] module.feature.module.feature.kubernetes_namespace.secret_namespace: Refreshing state... [id=sandbox] module.feature.module.feature.module.feature_key_vault.azurerm_key_vault.vault: Refreshing state... [id=/subscriptions/8f09f7f4-7b25-4d6f-88a5-847b1751c4ce/resourceGroups/rg-sandbox-tfpoc-feature/providers/Microsoft.KeyVault/vaults/kv-sand-tfpoc-feature] module.feature.module.feature.azurerm_redis_cache.feature[0]: Refreshing state... [id=/subscriptions/8f09f7f4-7b25-4d6f-88a5-847b1751c4ce/resourceGroups/rg-sandbox-tfpoc-feature/providers/Microsoft.Cache/redis/rc-sandbox-tfpoc-feature] module.feature.module.feature.data.azurerm_key_vault_secret.test_secret: Read complete after 2s [id=https://kv-sand-tfpoc-bootstrap.vault.azure.net/secrets/Test--Secret/faacf97fe9084e87a046b9c769a101e6] module.feature.module.feature.kubernetes_secret.cosmosdb-secret: Refreshing state... [id=sandbox/feature-secrets] Terraform used the selected providers to generate the following execution plan. Resource actions are indicated with the following symbols: - destroy Terraform will perform the following actions: # module.cluster.module.aks_cluster.azurerm_kubernetes_cluster.aks will be destroyed - resource "azurerm_kubernetes_cluster" "aks" { - api_server_authorized_ip_ranges = [] -> null - custom_ca_trust_certificates_base64 = [] -> null - dns_prefix = "aks-sandbox-tfpoc" -> null - enable_pod_security_policy = false -> null - fqdn = "aks-sandbox-tfpoc-uki25avh.hcp.eastus.azmk8s.io" -> null - id = "/subscriptions/8f09f7f4-7b25-4d6f-88a5-847b1751c4ce/resourceGroups/rg-sandbox-tfpoc-cluster/providers/Microsoft.ContainerService/managedClusters/aks-sandbox-tfpoc" -> null - image_cleaner_enabled = false -> null - image_cleaner_interval_hours = 48 -> null - kube_admin_config = (sensitive value) -> null - kube_config = (sensitive value) -> null - kube_config_raw = (sensitive value) -> null - kubernetes_version = "1.26.6" -> null - local_account_disabled = false -> null - location = "eastus" -> null - name = "aks-sandbox-tfpoc" -> null - node_resource_group = "MC_rg-sandbox-tfpoc-cluster_aks-sandbox-tfpoc_eastus" -> null - node_resource_group_id = "/subscriptions/8f09f7f4-7b25-4d6f-88a5-847b1751c4ce/resourceGroups/MC_rg-sandbox-tfpoc-cluster_aks-sandbox-tfpoc_eastus" -> null - oidc_issuer_enabled = false -> null - portal_fqdn = "aks-sandbox-tfpoc-uki25avh.portal.hcp.eastus.azmk8s.io" -> null - private_cluster_enabled = false -> null - private_cluster_public_fqdn_enabled = false -> null - public_network_access_enabled = true -> null - resource_group_name = "rg-sandbox-tfpoc-cluster" -> null - role_based_access_control_enabled = true -> null - run_command_enabled = true -> null - sku_tier = "Free" -> null - tags = {} -> null - workload_identity_enabled = false -> null - default_node_pool { - custom_ca_trust_enabled = false -> null - enable_auto_scaling = false -> null - enable_host_encryption = false -> null - enable_node_public_ip = false -> null - fips_enabled = false -> null - kubelet_disk_type = "OS" -> null - max_count = 0 -> null - max_pods = 110 -> null - min_count = 0 -> null - name = "default" -> null - node_count = 1 -> null - node_labels = {} -> null - node_taints = [] -> null - only_critical_addons_enabled = false -> null - orchestrator_version = "1.26.6" -> null - os_disk_size_gb = 128 -> null - os_disk_type = "Managed" -> null - os_sku = "Ubuntu" -> null - scale_down_mode = "Delete" -> null - tags = {} -> null - type = "VirtualMachineScaleSets" -> null - ultra_ssd_enabled = false -> null - vm_size = "Standard_D2_v2" -> null - zones = [] -> null } - identity { - identity_ids = [] -> null - principal_id = "21e7b38a-f98d-4113-9057-17da0a49e262" -> null - tenant_id = "4878e0c1-7017-468b-85f3-3686e1326e53" -> null - type = "SystemAssigned" -> null } - kubelet_identity { - client_id = "dcffd08c-a1c0-4cc5-991e-e342cc1c5562" -> null - object_id = "70a62c97-a2b2-46ba-ade5-ec6240650b81" -> null - user_assigned_identity_id = "/subscriptions/8f09f7f4-7b25-4d6f-88a5-847b1751c4ce/resourceGroups/MC_rg-sandbox-tfpoc-cluster_aks-sandbox-tfpoc_eastus/providers/Microsoft.ManagedIdentity/userAssignedIdentities/aks-sandbox-tfpoc-agentpool" -> null } - network_profile { - dns_service_ip = "10.0.0.10" -> null - ip_versions = [ - "IPv4", ] -> null - load_balancer_sku = "standard" -> null - network_plugin = "kubenet" -> null - outbound_type = "loadBalancer" -> null - pod_cidr = "10.244.0.0/16" -> null - pod_cidrs = [ - "10.244.0.0/16", ] -> null - service_cidr = "10.0.0.0/16" -> null - service_cidrs = [ - "10.0.0.0/16", ] -> null - load_balancer_profile { - effective_outbound_ips = [ - "/subscriptions/8f09f7f4-7b25-4d6f-88a5-847b1751c4ce/resourceGroups/MC_rg-sandbox-tfpoc-cluster_aks-sandbox-tfpoc_eastus/providers/Microsoft.Network/publicIPAddresses/c8480fc1-19fb-46f4-a32d-92560c085488", ] -> null - idle_timeout_in_minutes = 0 -> null - managed_outbound_ip_count = 1 -> null - managed_outbound_ipv6_count = 0 -> null - outbound_ip_address_ids = [] -> null - outbound_ip_prefix_ids = [] -> null - outbound_ports_allocated = 0 -> null } } } # module.cluster.module.aks_cluster.azurerm_resource_group.aks will be destroyed - resource "azurerm_resource_group" "aks" { - id = "/subscriptions/8f09f7f4-7b25-4d6f-88a5-847b1751c4ce/resourceGroups/rg-sandbox-tfpoc-cluster" -> null - location = "eastus" -> null - name = "rg-sandbox-tfpoc-cluster" -> null - tags = {} -> null } # module.feature.module.feature.azurerm_redis_cache.feature[0] will be destroyed - resource "azurerm_redis_cache" "feature" { - capacity = 2 -> null - enable_non_ssl_port = false -> null - family = "C" -> null - hostname = "rc-sandbox-tfpoc-feature.redis.cache.windows.net" -> null - id = "/subscriptions/8f09f7f4-7b25-4d6f-88a5-847b1751c4ce/resourceGroups/rg-sandbox-tfpoc-feature/providers/Microsoft.Cache/redis/rc-sandbox-tfpoc-feature" -> null - location = "eastus" -> null - minimum_tls_version = "1.2" -> null - name = "rc-sandbox-tfpoc-feature" -> null - port = 6379 -> null - primary_access_key = (sensitive value) -> null - primary_connection_string = (sensitive value) -> null - public_network_access_enabled = true -> null - redis_version = "6.0" -> null - replicas_per_master = 0 -> null - replicas_per_primary = 0 -> null - resource_group_name = "rg-sandbox-tfpoc-feature" -> null - secondary_access_key = (sensitive value) -> null - secondary_connection_string = (sensitive value) -> null - shard_count = 0 -> null - sku_name = "Standard" -> null - ssl_port = 6380 -> null - tags = {} -> null - tenant_settings = {} -> null - zones = [] -> null - redis_configuration { - aof_backup_enabled = false -> null - enable_authentication = true -> null - maxclients = 2000 -> null - maxfragmentationmemory_reserved = 299 -> null - maxmemory_delta = 299 -> null - maxmemory_policy = "volatile-lru" -> null - maxmemory_reserved = 299 -> null - rdb_backup_enabled = false -> null - rdb_backup_frequency = 0 -> null - rdb_backup_max_snapshot_count = 0 -> null } } # module.feature.module.feature.azurerm_resource_group.feature will be destroyed - resource "azurerm_resource_group" "feature" { - id = "/subscriptions/8f09f7f4-7b25-4d6f-88a5-847b1751c4ce/resourceGroups/rg-sandbox-tfpoc-feature" -> null - location = "eastus" -> null - name = "rg-sandbox-tfpoc-feature" -> null - tags = {} -> null } # module.feature.module.feature.kubernetes_namespace.secret_namespace will be destroyed - resource "kubernetes_namespace" "secret_namespace" { - id = "sandbox" -> null - wait_for_default_service_account = false -> null - metadata { - annotations = {} -> null - generation = 0 -> null - labels = {} -> null - name = "sandbox" -> null - resource_version = "1291" -> null - uid = "432cb5c7-5619-4ee1-a12f-29bdf118a71d" -> null } } # module.feature.module.feature.kubernetes_secret.cosmosdb-secret will be destroyed - resource "kubernetes_secret" "cosmosdb-secret" { - data = (sensitive value) -> null - id = "sandbox/feature-secrets" -> null - immutable = false -> null - type = "Opaque" -> null - wait_for_service_account_token = true -> null - metadata { - annotations = {} -> null - generation = 0 -> null - labels = {} -> null - name = "feature-secrets" -> null - namespace = "sandbox" -> null - resource_version = "11406" -> null - uid = "b1ea21b6-8d96-4c8a-803b-d41ac2da1e91" -> null } } # module.feature.module.feature.module.feature_key_vault.azurerm_key_vault.vault will be destroyed - resource "azurerm_key_vault" "vault" { - access_policy = [] -> null - enable_rbac_authorization = false -> null - enabled_for_deployment = true -> null - enabled_for_disk_encryption = true -> null - enabled_for_template_deployment = true -> null - id = "/subscriptions/8f09f7f4-7b25-4d6f-88a5-847b1751c4ce/resourceGroups/rg-sandbox-tfpoc-feature/providers/Microsoft.KeyVault/vaults/kv-sand-tfpoc-feature" -> null - location = "eastus" -> null - name = "kv-sand-tfpoc-feature" -> null - public_network_access_enabled = true -> null - purge_protection_enabled = true -> null - resource_group_name = "rg-sandbox-tfpoc-feature" -> null - sku_name = "standard" -> null - soft_delete_retention_days = 7 -> null - tags = {} -> null - tenant_id = "4878e0c1-7017-468b-85f3-3686e1326e53" -> null - vault_uri = "https://kv-sand-tfpoc-feature.vault.azure.net/" -> null - network_acls { - bypass = "AzureServices" -> null - default_action = "Allow" -> null - ip_rules = [] -> null - virtual_network_subnet_ids = [] -> null } } Plan: 0 to add, 0 to change, 7 to destroy. ───────────────────────────────────────────────────────────────────────────── Saved the plan to: tf.plan To perform exactly these actions, run the following command to apply: terraform apply "tf.plan" ```

Pusher: @spencerr Action: workflow_dispatch Working Directory: /home/runner/work/tf-poc/tf-poc/company-product/environments/sandbox Workflow: Company:Product -> Terraform

Workflow is pending manual review. URL: https://github.com/spencerr/tf-poc/actions/runs/6329577864

Required approvers: [spencerr]

Respond "approved", "approve", "lgtm", "yes" to continue workflow or "denied", "deny", "no" to cancel.

spencerr commented 1 year ago

yes

github-actions[bot] commented 1 year ago

All approvers have approved, continuing workflow and closing this issue.