-
Notifications
You must be signed in to change notification settings - Fork 10
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Investigate Terraform Plan terraform-advanced-analytics-workspaces-infrastructure repo #2035
Comments
This terraform plan is using this terraform version and these providers:
|
The first thing that's done is downloading all the terraform module dependencies that are being referenced directly or indirectly by the dev_cc_00.tf file.
|
Next there are a bunch of statements starting with Ok, apparently data blocks are for producing data that may change over time and are sourced from other entities not managed by terraform modules or variables. I think the ( |
I thought this statement in the terraform plan output (line 19) might have been the option regarding how far we go up in terms of terraform module dependencies:
But it's something else, it's a |
Interpreting the plan changes: |
The first three plan changes are to resources of type "azurerm_private_dns_zone". Private DNS Zone can be used when you wish to use a custom domain name for your Azure resources rather than using the Azure provided domain names. Link to resource type: https://learn.microsoft.com/en-us/azure/dns/dns-private-zone-terraform?tabs=azure-cli Next three plan changes are to resources of type "azurerm_private_dns_zone_virtual_network_link". Next two plan changes are to resources of type "azurerm_resource_group". Going to ignore the tag modifications from now on. |
Summarizing the first bunch of resources that necessitate replacements: resource "azurerm_advanced_threat_protection" "audit" resource "azurerm_monitor_diagnostic_setting" "kubernetes_audit" resource "azurerm_storage_account" "audit" resource "azurerm_storage_account_network_rules" "audit" Two resources of type "azurerm_virtual_network" resource "azurerm_advanced_threat_protection" "velero" resource "azurerm_role_assignment" "velero_storage_key_operator" resource "azurerm_storage_account" "velero" resource "azurerm_storage_account" "workflows" resource "azurerm_storage_account_network_rules" "velero" |
Looking into how the terraform plan output could be made to ignore certain changes in state. Found there is a meta-argument in terraform named It has a sub-argument named So in our case I was hoping we could write something like this:
I was looking to apply it at the provider block level and have it effect all the resources from that provider. I will try writing it at the provider level and see if the terraform code gets validated, maybe it will actually work... |
Plan Available at: https://gitlab.k8s.cloud.statcan.ca/cloudnative/aaw/terraform-advanced-analytics-workspaces-infrastructure/-/jobs/1375144
breaking changes
,non-breaking changes
,intended changes
Some Notes:
~ "PrimaryProjectContact" = "[email protected]" -> "[email protected]"
~ "PrimaryTechnicalContact" = "[email protected]" -> "[email protected]"
is non breaking, but how can we get rid of these from the Terraform plan because they add a bunch of annoying noise.
The text was updated successfully, but these errors were encountered: