Skip to content

Conversation

@obs-gh-nikhildua
Copy link
Contributor

No description provided.

@github-actions
Copy link

Terraform Plan Output

Click to expand
Terraform used the selected providers to generate the following execution
plan. Resource actions are indicated with the following symbols:
  + create
 <= read (data resources)

Terraform will perform the following actions:

  # observe_datastream_token.github_actions_branch_token will be created
  + resource "observe_datastream_token" "github_actions_branch_token" {
      + datastream = "o:::datastream:42592748"
      + disabled   = false
      + id         = (known after apply)
      + name       = "nikhil-remove-container"
      + oid        = (known after apply)
      + secret     = (sensitive value)
    }

  # module.terraform-azure-collection.data.azurerm_eventhub_namespace_authorization_rule.root_namespace_access_policy will be read during apply
  # (depends on a resource or a module with changes pending)
 <= data "azurerm_eventhub_namespace_authorization_rule" "root_namespace_access_policy" {
      + id                                = (known after apply)
      + listen                            = (known after apply)
      + manage                            = (known after apply)
      + name                              = "RootManageSharedAccessKey"
      + namespace_name                    = "gh-ehns-nikhil-remove-container"
      + primary_connection_string         = (sensitive value)
      + primary_connection_string_alias   = (sensitive value)
      + primary_key                       = (sensitive value)
      + resource_group_name               = "gh-rg-nikhil-remove-container"
      + secondary_connection_string       = (sensitive value)
      + secondary_connection_string_alias = (sensitive value)
      + secondary_key                     = (sensitive value)
      + send                              = (known after apply)
    }

  # module.terraform-azure-collection.azuread_application.observe_app_registration will be created
  + resource "azuread_application" "observe_app_registration" {
      + app_role_ids                = (known after apply)
      + client_id                   = (known after apply)
      + disabled_by_microsoft       = (known after apply)
      + display_name                = "gh-app-nikhil-remove-container"
      + id                          = (known after apply)
      + logo_url                    = (known after apply)
      + oauth2_permission_scope_ids = (known after apply)
      + object_id                   = (known after apply)
      + owners                      = [
          + "60400f49-81ac-44df-a6a4-218d51ad8fde",
        ]
      + prevent_duplicate_names     = false
      + publisher_domain            = (known after apply)
      + sign_in_audience            = "AzureADMyOrg"
      + tags                        = [
          + "nikhil-remove-container",
          + "terraform-ci",
        ]
      + template_id                 = (known after apply)

      + feature_tags (known after apply)

      + password (known after apply)
    }

  # module.terraform-azure-collection.azuread_application_password.observe_password will be created
  + resource "azuread_application_password" "observe_password" {
      + application_id = (known after apply)
      + display_name   = (known after apply)
      + end_date       = (known after apply)
      + id             = (known after apply)
      + key_id         = (known after apply)
      + start_date     = (known after apply)
      + value          = (sensitive value)
    }

  # module.terraform-azure-collection.azuread_service_principal.observe_service_principal will be created
  + resource "azuread_service_principal" "observe_service_principal" {
      + account_enabled             = true
      + app_role_ids                = (known after apply)
      + app_roles                   = (known after apply)
      + application_tenant_id       = (known after apply)
      + client_id                   = (known after apply)
      + display_name                = (known after apply)
      + homepage_url                = (known after apply)
      + id                          = (known after apply)
      + logout_url                  = (known after apply)
      + oauth2_permission_scope_ids = (known after apply)
      + oauth2_permission_scopes    = (known after apply)
      + object_id                   = (known after apply)
      + redirect_uris               = (known after apply)
      + saml_metadata_url           = (known after apply)
      + service_principal_names     = (known after apply)
      + sign_in_audience            = (known after apply)
      + tags                        = (known after apply)
      + type                        = (known after apply)

      + feature_tags (known after apply)

      + features (known after apply)
    }

  # module.terraform-azure-collection.azurerm_eventhub.observe_eventhub will be created
  + resource "azurerm_eventhub" "observe_eventhub" {
      + id                  = (known after apply)
      + message_retention   = 7
      + name                = "gh-eh-nikhil-remove-container"
      + namespace_name      = "gh-ehns-nikhil-remove-container"
      + partition_count     = 32
      + partition_ids       = (known after apply)
      + resource_group_name = "gh-rg-nikhil-remove-container"
      + status              = "Active"
    }

  # module.terraform-azure-collection.azurerm_eventhub_authorization_rule.observe_eventhub_access_policy will be created
  + resource "azurerm_eventhub_authorization_rule" "observe_eventhub_access_policy" {
      + eventhub_name                     = "gh-eh-nikhil-remove-container"
      + id                                = (known after apply)
      + listen                            = true
      + manage                            = false
      + name                              = "gh-ehap-nikhil-remove-container"
      + namespace_name                    = "gh-ehns-nikhil-remove-container"
      + primary_connection_string         = (sensitive value)
      + primary_connection_string_alias   = (sensitive value)
      + primary_key                       = (sensitive value)
      + resource_group_name               = "gh-rg-nikhil-remove-container"
      + secondary_connection_string       = (sensitive value)
      + secondary_connection_string_alias = (sensitive value)
      + secondary_key                     = (sensitive value)
      + send                              = false
    }

  # module.terraform-azure-collection.azurerm_eventhub_namespace.observe_eventhub_namespace will be created
  + resource "azurerm_eventhub_namespace" "observe_eventhub_namespace" {
      + auto_inflate_enabled                      = false
      + capacity                                  = 2
      + default_primary_connection_string         = (sensitive value)
      + default_primary_connection_string_alias   = (sensitive value)
      + default_primary_key                       = (sensitive value)
      + default_secondary_connection_string       = (sensitive value)
      + default_secondary_connection_string_alias = (sensitive value)
      + default_secondary_key                     = (sensitive value)
      + id                                        = (known after apply)
      + local_authentication_enabled              = true
      + location                                  = "centralus"
      + minimum_tls_version                       = (known after apply)
      + name                                      = "gh-ehns-nikhil-remove-container"
      + network_rulesets                          = (known after apply)
      + public_network_access_enabled             = true
      + resource_group_name                       = "gh-rg-nikhil-remove-container"
      + sku                                       = "Standard"
      + tags                                      = {
          + "branch"     = "nikhil-remove-container"
          + "created_by" = "terraform-ci"
        }
      + zone_redundant                            = false
    }

  # module.terraform-azure-collection.azurerm_key_vault.key_vault will be created
  + resource "azurerm_key_vault" "key_vault" {
      + access_policy                 = (known after apply)
      + id                            = (known after apply)
      + location                      = "centralus"
      + name                          = "ghkvnikhilremovecontaine"
      + public_network_access_enabled = true
      + resource_group_name           = "gh-rg-nikhil-remove-container"
      + sku_name                      = "standard"
      + soft_delete_retention_days    = 90
      + tags                          = {
          + "branch"     = "nikhil-remove-container"
          + "created_by" = "terraform-ci"
        }
      + tenant_id                     = "81665909-a4e6-466b-9671-4d9ef491267f"
      + vault_uri                     = (known after apply)

      + contact (known after apply)

      + network_acls (known after apply)
    }

  # module.terraform-azure-collection.azurerm_key_vault_access_policy.app will be created
  + resource "azurerm_key_vault_access_policy" "app" {
      + id                 = (known after apply)
      + key_vault_id       = (known after apply)
      + object_id          = (known after apply)
      + secret_permissions = [
          + "Backup",
          + "Restore",
          + "Get",
          + "Set",
          + "List",
          + "Delete",
          + "Purge",
        ]
      + tenant_id          = "81665909-a4e6-466b-9671-4d9ef491267f"
    }

  # module.terraform-azure-collection.azurerm_key_vault_access_policy.user will be created
  + resource "azurerm_key_vault_access_policy" "user" {
      + id                 = (known after apply)
      + key_vault_id       = (known after apply)
      + object_id          = "60400f49-81ac-44df-a6a4-218d51ad8fde"
      + secret_permissions = [
          + "Backup",
          + "Restore",
          + "Get",
          + "Set",
          + "List",
          + "Delete",
          + "Purge",
        ]
      + tenant_id          = "81665909-a4e6-466b-9671-4d9ef491267f"
    }

  # module.terraform-azure-collection.azurerm_key_vault_secret.observe_password will be created
  + resource "azurerm_key_vault_secret" "observe_password" {
      + id                      = (known after apply)
      + key_vault_id            = (known after apply)
      + name                    = "observe-password"
      + resource_id             = (known after apply)
      + resource_versionless_id = (known after apply)
      + value                   = (sensitive value)
      + version                 = (known after apply)
      + versionless_id          = (known after apply)
    }

  # module.terraform-azure-collection.azurerm_key_vault_secret.observe_token will be created
  + resource "azurerm_key_vault_secret" "observe_token" {
      + id                      = (known after apply)
      + key_vault_id            = (known after apply)
      + name                    = "observe-token"
      + resource_id             = (known after apply)
      + resource_versionless_id = (known after apply)
      + value                   = (sensitive value)
      + version                 = (known after apply)
      + versionless_id          = (known after apply)
    }

  # module.terraform-azure-collection.azurerm_linux_function_app.observe_collect_function_app will be created
  + resource "azurerm_linux_function_app" "observe_collect_function_app" {
      + app_settings                                   = (known after apply)
      + builtin_logging_enabled                        = true
      + client_certificate_enabled                     = false
      + client_certificate_mode                        = "Optional"
      + content_share_force_disabled                   = false
      + custom_domain_verification_id                  = (sensitive value)
      + daily_memory_time_quota                        = 0
      + default_hostname                               = (known after apply)
      + enabled                                        = true
      + ftp_publish_basic_authentication_enabled       = true
      + functions_extension_version                    = "~4"
      + hosting_environment_id                         = (known after apply)
      + https_only                                     = false
      + id                                             = (known after apply)
      + key_vault_reference_identity_id                = (known after apply)
      + kind                                           = (known after apply)
      + location                                       = "centralus"
      + name                                           = "gh-fa-nikhil-remove-container"
      + outbound_ip_address_list                       = (known after apply)
      + outbound_ip_addresses                          = (known after apply)
      + possible_outbound_ip_address_list              = (known after apply)
      + possible_outbound_ip_addresses                 = (known after apply)
      + public_network_access_enabled                  = true
      + resource_group_name                            = "gh-rg-nikhil-remove-container"
      + service_plan_id                                = (known after apply)
      + site_credential                                = (sensitive value)
      + storage_account_access_key                     = (sensitive value)
      + storage_account_name                           = "ghsanikhilremovecontaine"
      + storage_uses_managed_identity                  = false
      + tags                                           = {
          + "branch"     = "nikhil-remove-container"
          + "created_by" = "terraform-ci"
        }
      + webdeploy_publish_basic_authentication_enabled = true
      + zip_deploy_file                                = (known after apply)

      + identity {
          + principal_id = (known after apply)
          + tenant_id    = (known after apply)
          + type         = "SystemAssigned"
        }

      + site_config {
          + always_on                               = (known after apply)
          + app_scale_limit                         = (known after apply)
          + container_registry_use_managed_identity = false
          + default_documents                       = (known after apply)
          + detailed_error_logging_enabled          = (known after apply)
          + elastic_instance_minimum                = (known after apply)
          + ftps_state                              = "Disabled"
          + health_check_eviction_time_in_min       = (known after apply)
          + http2_enabled                           = false
          + ip_restriction_default_action           = "Allow"
          + linux_fx_version                        = (known after apply)
          + load_balancing_mode                     = "LeastRequests"
          + managed_pipeline_mode                   = "Integrated"
          + minimum_tls_version                     = "1.2"
          + pre_warmed_instance_count               = (known after apply)
          + remote_debugging_enabled                = false
          + remote_debugging_version                = (known after apply)
          + scm_ip_restriction_default_action       = "Allow"
          + scm_minimum_tls_version                 = "1.2"
          + scm_type                                = (known after apply)
          + scm_use_main_ip_restriction             = false
          + use_32_bit_worker                       = false
          + vnet_route_all_enabled                  = false
          + websockets_enabled                      = false
          + worker_count                            = (known after apply)

          + application_stack {
              + python_version              = "3.9"
              + use_dotnet_isolated_runtime = false
            }
        }
    }

  # module.terraform-azure-collection.azurerm_monitor_diagnostic_setting.observe_collect_function_app[0] will be created
  + resource "azurerm_monitor_diagnostic_setting" "observe_collect_function_app" {
      + eventhub_authorization_rule_id = (known after apply)
      + eventhub_name                  = "gh-eh-nikhil-remove-container"
      + id                             = (known after apply)
      + log_analytics_destination_type = (known after apply)
      + name                           = "gh-fa-ds-nikhil-remove-container"
      + target_resource_id             = (known after apply)

      + enabled_log {
          + category       = "FunctionAppLogs"
            # (1 unchanged attribute hidden)
        }

      + log (known after apply)

      + metric {
          + category = "AllMetrics"
          + enabled  = true
        }
    }

  # module.terraform-azure-collection.azurerm_resource_group.observe_resource_group will be created
  + resource "azurerm_resource_group" "observe_resource_group" {
      + id       = (known after apply)
      + location = "centralus"
      + name     = "gh-rg-nikhil-remove-container"
      + tags     = {
          + "branch"     = "nikhil-remove-container"
          + "created_by" = "terraform-ci"
        }
    }

  # module.terraform-azure-collection.azurerm_role_assignment.observe_role_assignment will be created
  + resource "azurerm_role_assignment" "observe_role_assignment" {
      + id                               = (known after apply)
      + name                             = (known after apply)
      + principal_id                     = (known after apply)
      + principal_type                   = (known after apply)
      + role_definition_id               = (known after apply)
      + role_definition_name             = "Monitoring Reader"
      + scope                            = "/subscriptions/080291cf-8419-427c-953c-944e6c351029"
      + skip_service_principal_aad_check = (known after apply)
    }

  # module.terraform-azure-collection.azurerm_service_plan.observe_service_plan will be created
  + resource "azurerm_service_plan" "observe_service_plan" {
      + id                           = (known after apply)
      + kind                         = (known after apply)
      + location                     = "centralus"
      + maximum_elastic_worker_count = (known after apply)
      + name                         = "gh-sp-nikhil-remove-container"
      + os_type                      = "Linux"
      + per_site_scaling_enabled     = false
      + reserved                     = (known after apply)
      + resource_group_name          = "gh-rg-nikhil-remove-container"
      + sku_name                     = "Y1"
      + tags                         = {
          + "branch"     = "nikhil-remove-container"
          + "created_by" = "terraform-ci"
        }
      + worker_count                 = (known after apply)
    }

  # module.terraform-azure-collection.azurerm_storage_account.observe_storage_account will be created
  + resource "azurerm_storage_account" "observe_storage_account" {
      + access_tier                        = (known after apply)
      + account_kind                       = "StorageV2"
      + account_replication_type           = "LRS"
      + account_tier                       = "Standard"
      + allow_nested_items_to_be_public    = true
      + cross_tenant_replication_enabled   = true
      + default_to_oauth_authentication    = false
      + dns_endpoint_type                  = "Standard"
      + enable_https_traffic_only          = (known after apply)
      + https_traffic_only_enabled         = (known after apply)
      + id                                 = (known after apply)
      + infrastructure_encryption_enabled  = false
      + is_hns_enabled                     = false
      + large_file_share_enabled           = (known after apply)
      + local_user_enabled                 = true
      + location                           = "centralus"
      + min_tls_version                    = "TLS1_2"
      + name                               = "ghsanikhilremovecontaine"
      + nfsv3_enabled                      = false
      + primary_access_key                 = (sensitive value)
      + primary_blob_connection_string     = (sensitive value)
      + primary_blob_endpoint              = (known after apply)
      + primary_blob_host                  = (known after apply)
      + primary_blob_internet_endpoint     = (known after apply)
      + primary_blob_internet_host         = (known after apply)
      + primary_blob_microsoft_endpoint    = (known after apply)
      + primary_blob_microsoft_host        = (known after apply)
      + primary_connection_string          = (sensitive value)
      + primary_dfs_endpoint               = (known after apply)
      + primary_dfs_host                   = (known after apply)
      + primary_dfs_internet_endpoint      = (known after apply)
      + primary_dfs_internet_host          = (known after apply)
      + primary_dfs_microsoft_endpoint     = (known after apply)
      + primary_dfs_microsoft_host         = (known after apply)
      + primary_file_endpoint              = (known after apply)
      + primary_file_host                  = (known after apply)
      + primary_file_internet_endpoint     = (known after apply)
      + primary_file_internet_host         = (known after apply)
      + primary_file_microsoft_endpoint    = (known after apply)
      + primary_file_microsoft_host        = (known after apply)
      + primary_location                   = (known after apply)
      + primary_queue_endpoint             = (known after apply)
      + primary_queue_host                 = (known after apply)
      + primary_queue_microsoft_endpoint   = (known after apply)
      + primary_queue_microsoft_host       = (known after apply)
      + primary_table_endpoint             = (known after apply)
      + primary_table_host                 = (known after apply)
      + primary_table_microsoft_endpoint   = (known after apply)
      + primary_table_microsoft_host       = (known after apply)
      + primary_web_endpoint               = (known after apply)
      + primary_web_host                   = (known after apply)
      + primary_web_internet_endpoint      = (known after apply)
      + primary_web_internet_host          = (known after apply)
      + primary_web_microsoft_endpoint     = (known after apply)
      + primary_web_microsoft_host         = (known after apply)
      + public_network_access_enabled      = true
      + queue_encryption_key_type          = "Service"
      + resource_group_name                = "gh-rg-nikhil-remove-container"
      + secondary_access_key               = (sensitive value)
      + secondary_blob_connection_string   = (sensitive value)
      + secondary_blob_endpoint            = (known after apply)
      + secondary_blob_host                = (known after apply)
      + secondary_blob_internet_endpoint   = (known after apply)
      + secondary_blob_internet_host       = (known after apply)
      + secondary_blob_microsoft_endpoint  = (known after apply)
      + secondary_blob_microsoft_host      = (known after apply)
      + secondary_connection_string        = (sensitive value)
      + secondary_dfs_endpoint             = (known after apply)
      + secondary_dfs_host                 = (known after apply)
      + secondary_dfs_internet_endpoint    = (known after apply)
      + secondary_dfs_internet_host        = (known after apply)
      + secondary_dfs_microsoft_endpoint   = (known after apply)
      + secondary_dfs_microsoft_host       = (known after apply)
      + secondary_file_endpoint            = (known after apply)
      + secondary_file_host                = (known after apply)
      + secondary_file_internet_endpoint   = (known after apply)
      + secondary_file_internet_host       = (known after apply)
      + secondary_file_microsoft_endpoint  = (known after apply)
      + secondary_file_microsoft_host      = (known after apply)
      + secondary_location                 = (known after apply)
      + secondary_queue_endpoint           = (known after apply)
      + secondary_queue_host               = (known after apply)
      + secondary_queue_microsoft_endpoint = (known after apply)
      + secondary_queue_microsoft_host     = (known after apply)
      + secondary_table_endpoint           = (known after apply)
      + secondary_table_host               = (known after apply)
      + secondary_table_microsoft_endpoint = (known after apply)
      + secondary_table_microsoft_host     = (known after apply)
      + secondary_web_endpoint             = (known after apply)
      + secondary_web_host                 = (known after apply)
      + secondary_web_internet_endpoint    = (known after apply)
      + secondary_web_internet_host        = (known after apply)
      + secondary_web_microsoft_endpoint   = (known after apply)
      + secondary_web_microsoft_host       = (known after apply)
      + sftp_enabled                       = false
      + shared_access_key_enabled          = true
      + table_encryption_key_type          = "Service"
      + tags                               = {
          + "branch"     = "nikhil-remove-container"
          + "created_by" = "terraform-ci"
        }

      + blob_properties (known after apply)

      + network_rules (known after apply)

      + queue_properties (known after apply)

      + routing (known after apply)

      + share_properties (known after apply)
    }

Plan: 18 to add, 0 to change, 0 to destroy.

Changes to Outputs:
  + azure_collection_function = "https://observeinc.s3.us-west-2.amazonaws.com/azure/azure-collection-functions-0.11.4.zip"
  + azure_dataset_id          = "42592749"
  + observe_token_id          = (known after apply)

@obs-gh-nikhildua obs-gh-nikhildua merged commit ef64d4b into main Oct 16, 2024
1 check passed
@obs-gh-austinnixon obs-gh-austinnixon deleted the nikhil/remove-container branch April 14, 2025 14:00
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants