Skip to content

Terraform Configuration Drift Detected #51

@github-actions

Description

@github-actions

Terraform Plan Output

Click to expand
Terraform used the selected providers to generate the following execution
plan. Resource actions are indicated with the following symbols:
  + create

Terraform will perform the following actions:

  # civo_firewall.firewall will be created
  + resource "civo_firewall" "firewall" {
      + create_default_rules = false
      + id                   = (known after apply)
      + name                 = "demos-firewall"
      + network_id           = (known after apply)
      + region               = (known after apply)

      + egress_rule {
          + action     = (known after apply)
          + cidr       = (known after apply)
          + id         = (known after apply)
          + label      = (known after apply)
          + port_range = (known after apply)
          + protocol   = (known after apply)
        }

      + ingress_rule {
          + action     = "allow"
          + cidr       = [
              + "0.0.0.0/0",
            ]
          + id         = (known after apply)
          + label      = "kubernetes-api-server"
          + port_range = "6443"
          + protocol   = "tcp"
        }
    }

  # civo_kubernetes_cluster.demo-cluster will be created
  + resource "civo_kubernetes_cluster" "demo-cluster" {
      + api_endpoint           = (known after apply)
      + cluster_type           = "k3s"
      + cni                    = "cilium"
      + created_at             = (known after apply)
      + dns_entry              = (known after apply)
      + firewall_id            = (known after apply)
      + id                     = (known after apply)
      + installed_applications = (known after apply)
      + kubeconfig             = (sensitive value)
      + kubernetes_version     = (known after apply)
      + master_ip              = (known after apply)
      + name                   = "demo-cluster"
      + network_id             = (known after apply)
      + num_target_nodes       = (known after apply)
      + ready                  = (known after apply)
      + region                 = (known after apply)
      + status                 = (known after apply)
      + target_nodes_size      = (known after apply)

      + pools {
          + instance_names      = (known after apply)
          + label               = "partypool"
          + node_count          = 2
          + public_ip_node_pool = (known after apply)
          + size                = "g4s.kube.large"
        }
    }

  # local_file.kubeconfig will be created
  + resource "local_file" "kubeconfig" {
      + content              = (sensitive)
      + content_base64sha256 = (known after apply)
      + content_base64sha512 = (known after apply)
      + content_md5          = (known after apply)
      + content_sha1         = (known after apply)
      + content_sha256       = (known after apply)
      + content_sha512       = (known after apply)
      + directory_permission = "0777"
      + file_permission      = "0777"
      + filename             = "./kubeconfig"
      + id                   = (known after apply)
    }

Plan: 3 to add, 0 to change, 0 to destroy.

Changes to Outputs:
  + civo_node_size = "g4s.kube.large"
  + clustername    = "demo-cluster"

Metadata

Metadata

Labels

No labels
No labels

Type

No type

Projects

No projects

Milestone

No milestone

Relationships

None yet

Development

No branches or pull requests

Issue actions