Skip to content

Upgrade Provider Versions #281

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
merged 3 commits into from
Nov 4, 2024
Merged

Upgrade Provider Versions #281

merged 3 commits into from
Nov 4, 2024

Conversation

marvinbuss
Copy link
Contributor

Proposed changes:

  • Update azurrm to version 4.8.0
  • Upgrade azapi to version 2.0.1

@marvinbuss marvinbuss added the enhancement New feature or request label Nov 4, 2024
@marvinbuss marvinbuss self-assigned this Nov 4, 2024
Copy link

github-actions bot commented Nov 4, 2024

Terraform Lint Results

  • Terraform Version 📎1.9.6
  • Working Directory 📂./code/infra
  • Terraform Format and Style 🖌success

Copy link

github-actions bot commented Nov 4, 2024

Terraform Validation & Plan Results

  • Terraform Version 📎1.9.6
  • Working Directory 📂./code/infra
  • Terraform Initialization ⚙️success
  • Terraform Validation 🤖success
  • Terraform Plan 📖success
Show Plan

terraform
Acquiring state lock. This may take a few moments...
�[0m�[1mdata.azurerm_location.current: Reading...�[0m�[0m
�[0m�[1mdata.azurerm_virtual_network.virtual_network: Reading...�[0m�[0m
�[0m�[1mdata.azurerm_route_table.route_table: Reading...�[0m�[0m
�[0m�[1mmodule.storage_account.data.azurerm_client_config.current: Reading...�[0m�[0m
�[0m�[1mdata.azurerm_subscription.current: Reading...�[0m�[0m
�[0m�[1mmodule.key_vault.data.azurerm_client_config.current: Reading...�[0m�[0m
�[0m�[1mdata.azurerm_network_security_group.network_security_group: Reading...�[0m�[0m
�[0m�[1mdata.azurerm_client_config.current: Reading...�[0m�[0m
�[0m�[1mmodule.storage_account.data.azurerm_client_config.current: Read complete after 0s [id=Y2xpZW50Q29uZmlncy9jbGllbnRJZD1lNWRmNjg0My1lYmRlLTRkNzktOWM3ZS03NDMxYTNjZDQzZDI7b2JqZWN0SWQ9OTczZGYyYWQtNGU1ZS00ZThiLTlkZjYtMTdmNjFlOWVmZDU1O3N1YnNjcmlwdGlvbklkPTFmZGFiMTE4LTE2MzgtNDE5YS04YjEyLTA2Yzk1NDM3MTRhMDt0ZW5hbnRJZD0zNzk2M2RkNC1mNGU2LTQwZjgtYTdkNi0yNGI5NzkxOWU0NTI=]�[0m
�[0m�[1mmodule.key_vault.data.azurerm_client_config.current: Read complete after 0s [id=Y2xpZW50Q29uZmlncy9jbGllbnRJZD1lNWRmNjg0My1lYmRlLTRkNzktOWM3ZS03NDMxYTNjZDQzZDI7b2JqZWN0SWQ9OTczZGYyYWQtNGU1ZS00ZThiLTlkZjYtMTdmNjFlOWVmZDU1O3N1YnNjcmlwdGlvbklkPTFmZGFiMTE4LTE2MzgtNDE5YS04YjEyLTA2Yzk1NDM3MTRhMDt0ZW5hbnRJZD0zNzk2M2RkNC1mNGU2LTQwZjgtYTdkNi0yNGI5NzkxOWU0NTI=]�[0m
�[0m�[1mdata.azurerm_client_config.current: Read complete after 0s [id=Y2xpZW50Q29uZmlncy9jbGllbnRJZD1lNWRmNjg0My1lYmRlLTRkNzktOWM3ZS03NDMxYTNjZDQzZDI7b2JqZWN0SWQ9OTczZGYyYWQtNGU1ZS00ZThiLTlkZjYtMTdmNjFlOWVmZDU1O3N1YnNjcmlwdGlvbklkPTFmZGFiMTE4LTE2MzgtNDE5YS04YjEyLTA2Yzk1NDM3MTRhMDt0ZW5hbnRJZD0zNzk2M2RkNC1mNGU2LTQwZjgtYTdkNi0yNGI5NzkxOWU0NTI=]�[0m
�[0m�[1mdata.azurerm_subscription.current: Read complete after 0s [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0]�[0m
�[0m�[1mdata.azurerm_route_table.route_table: Read complete after 1s [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/ptt-dev-networking-rg/providers/Microsoft.Network/routeTables/ptt-dev-default-rt001]�[0m
�[0m�[1mdata.azurerm_virtual_network.virtual_network: Read complete after 1s [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/ptt-dev-networking-rg/providers/Microsoft.Network/virtualNetworks/spoke-ptt-dev-vnet001]�[0m
�[0m�[1mdata.azurerm_network_security_group.network_security_group: Read complete after 1s [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/ptt-dev-networking-rg/providers/Microsoft.Network/networkSecurityGroups/ptt-dev-default-nsg001]�[0m
�[0m�[1mdata.azurerm_location.current: Read complete after 1s [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/locations/northeurope]�[0m

Terraform used the selected providers to generate the following execution
plan. Resource actions are indicated with the following symbols:
  �[32m+�[0m create�[0m
 �[36m<=�[0m read (data resources)�[0m

Terraform will perform the following actions:

�[1m  # data.azurerm_monitor_diagnostic_categories.diagnostic_categories_function�[0m will be read during apply
  # (config refers to values not yet known)
�[0m �[36m<=�[0m�[0m data "azurerm_monitor_diagnostic_categories" "diagnostic_categories_function" {
      �[32m+�[0m�[0m id                  = (known after apply)
      �[32m+�[0m�[0m log_category_groups = (known after apply)
      �[32m+�[0m�[0m log_category_types  = (known after apply)
      �[32m+�[0m�[0m metrics             = (known after apply)
      �[32m+�[0m�[0m resource_id         = (known after apply)
    }

�[1m  # azapi_resource.function�[0m will be created
�[0m  �[32m+�[0m�[0m resource "azapi_resource" "function" {
      �[32m+�[0m�[0m body                      = {
          �[32m+�[0m�[0m kind       = "functionapp,linux,container"
          �[32m+�[0m�[0m properties = {
              �[32m+�[0m�[0m clientAffinityEnabled     = false
              �[32m+�[0m�[0m clientCertEnabled         = false
              �[32m+�[0m�[0m clientCertMode            = "Required"
              �[32m+�[0m�[0m enabled                   = true
              �[32m+�[0m�[0m hostNamesDisabled         = false
              �[32m+�[0m�[0m httpsOnly                 = true
              �[32m+�[0m�[0m hyperV                    = false
              �[32m+�[0m�[0m isXenon                   = false
              �[32m+�[0m�[0m keyVaultReferenceIdentity = "SystemAssigned"
              �[32m+�[0m�[0m publicNetworkAccess       = "Disabled"
              �[32m+�[0m�[0m redundancyMode            = "None"
              �[32m+�[0m�[0m reserved                  = true
              �[32m+�[0m�[0m scmSiteAlsoStopped        = true
              �[32m+�[0m�[0m serverFarmId              = (known after apply)
              �[32m+�[0m�[0m siteConfig                = {
                  �[32m+�[0m�[0m acrUseManagedIdentityCreds             = false
                  �[32m+�[0m�[0m alwaysOn                               = false
                  �[32m+�[0m�[0m appSettings                            = [
                      �[32m+�[0m�[0m {
                          �[32m+�[0m�[0m name  = "APPLICATIONINSIGHTS_CONNECTION_STRING"
                          �[32m+�[0m�[0m value = (sensitive value)
                        },
                      �[32m+�[0m�[0m {
                          �[32m+�[0m�[0m name  = "AZURE_SDK_TRACING_IMPLEMENTATION"
                          �[32m+�[0m�[0m value = "opentelemetry"
                        },
                      �[32m+�[0m�[0m {
                          �[32m+�[0m�[0m name  = "AZURE_TRACING_ENABLED"
                          �[32m+�[0m�[0m value = "true"
                        },
                      �[32m+�[0m�[0m {
                          �[32m+�[0m�[0m name  = "OTEL_PYTHON_REQUESTS_EXCLUDED_URLS"
                          �[32m+�[0m�[0m value = ".*.in.applicationinsights.azure.com/.*"
                        },
                      �[32m+�[0m�[0m {
                          �[32m+�[0m�[0m name  = "AZURE_FUNCTIONS_ENVIRONMENT"
                          �[32m+�[0m�[0m value = "Production"
                        },
                      �[32m+�[0m�[0m {
                          �[32m+�[0m�[0m name  = "FUNCTIONS_WORKER_PROCESS_COUNT"
                          �[32m+�[0m�[0m value = 1
                        },
                      �[32m+�[0m�[0m {
                          �[32m+�[0m�[0m name  = "FUNCTIONS_EXTENSION_VERSION"
                          �[32m+�[0m�[0m value = "~4"
                        },
                      �[32m+�[0m�[0m {
                          �[32m+�[0m�[0m name  = "WEBSITE_CONTENTOVERVNET"
                          �[32m+�[0m�[0m value = "1"
                        },
                      �[32m+�[0m�[0m {
                          �[32m+�[0m�[0m name  = "WEBSITE_OS_TYPE"
                          �[32m+�[0m�[0m value = "Linux"
                        },
                      �[32m+�[0m�[0m {
                          �[32m+�[0m�[0m name  = "WEBSITE_RUN_FROM_PACKAGE"
                          �[32m+�[0m�[0m value = "0"
                        },
                      �[32m+�[0m�[0m {
                          �[32m+�[0m�[0m name  = "AzureWebJobsStorage__accountName"
                          �[32m+�[0m�[0m value = "secfuncdevstg001"
                        },
                      �[32m+�[0m�[0m {
                          �[32m+�[0m�[0m name  = "AzureWebJobsSecretStorageType"
                          �[32m+�[0m�[0m value = "keyvault"
                        },
                      �[32m+�[0m�[0m {
                          �[32m+�[0m�[0m name  = "AzureWebJobsSecretStorageKeyVaultUri"
                          �[32m+�[0m�[0m value = (known after apply)
                        },
                      �[32m+�[0m�[0m {
                          �[32m+�[0m�[0m name  = "WEBSITES_ENABLE_APP_SERVICE_STORAGE"
                          �[32m+�[0m�[0m value = "false"
                        },
                      �[32m+�[0m�[0m {
                          �[32m+�[0m�[0m name  = "DOCKER_REGISTRY_SERVER_URL"
                          �[32m+�[0m�[0m value = "https://ghcr.io"
                        },
                      �[32m+�[0m�[0m {
                          �[32m+�[0m�[0m name  = "MY_SECRET_CONFIG"
                          �[32m+�[0m�[0m value = (known after apply)
                        },
                    ]
                  �[32m+�[0m�[0m azureStorageAccounts                   = {}
                  �[32m+�[0m�[0m detailedErrorLoggingEnabled            = true
                  �[32m+�[0m�[0m ftpsState                              = "Disabled"
                  �[32m+�[0m�[0m functionAppScaleLimit                  = 0
                  �[32m+�[0m�[0m functionsRuntimeScaleMonitoringEnabled = true
                  �[32m+�[0m�[0m healthCheckPath                        = "/v1/health/heartbeat"
                  �[32m+�[0m�[0m http20Enabled                          = true
                  �[32m+�[0m�[0m ipSecurityRestrictionsDefaultAction    = "Deny"
                  �[32m+�[0m�[0m linuxFxVersion                         = "DOCKER|ghcr.io/perfectthymetech/azurefunctionpython:main"
                  �[32m+�[0m�[0m loadBalancing                          = "LeastRequests"
                  �[32m+�[0m�[0m localMySqlEnabled                      = false
                  �[32m+�[0m�[0m minTlsCipherSuite                      = "TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256"
                  �[32m+�[0m�[0m minTlsVersion                          = "1.2"
                  �[32m+�[0m�[0m minimumElasticInstanceCount            = 1
                  �[32m+�[0m�[0m numberOfWorkers                        = 1
                  �[32m+�[0m�[0m preWarmedInstanceCount                 = 0
                  �[32m+�[0m�[0m remoteDebuggingEnabled                 = false
                  �[32m+�[0m�[0m requestTracingEnabled                  = true
                  �[32m+�[0m�[0m scmIpSecurityRestrictionsDefaultAction = "Deny"
                  �[32m+�[0m�[0m scmIpSecurityRestrictionsUseMain       = false
                  �[32m+�[0m�[0m scmMinTlsVersion                       = "1.2"
                  �[32m+�[0m�[0m use32BitWorkerProcess                  = true
                  �[32m+�[0m�[0m vnetPrivatePortsCount                  = 0
                  �[32m+�[0m�[0m webSocketsEnabled                      = false
                }
              �[32m+�[0m�[0m storageAccountRequired    = false
              �[32m+�[0m�[0m virtualNetworkSubnetId    = (known after apply)
              �[32m+�[0m�[0m vnetContentShareEnabled   = true
              �[32m+�[0m�[0m vnetImagePullEnabled      = false
              �[32m+�[0m�[0m vnetRouteAllEnabled       = true
            }
        }
      �[32m+�[0m�[0m id                        = (known after apply)
      �[32m+�[0m�[0m ignore_casing             = false
      �[32m+�[0m�[0m ignore_missing_property   = true
      �[32m+�[0m�[0m location                  = "northeurope"
      �[32m+�[0m�[0m name                      = "secfunc-dev-fctn001"
      �[32m+�[0m�[0m output                    = (known after apply)
      �[32m+�[0m�[0m parent_id                 = (known after apply)
      �[32m+�[0m�[0m schema_validation_enabled = false
      �[32m+�[0m�[0m tags                      = {}
      �[32m+�[0m�[0m type                      = "Microsoft.Web/sites@2022-09-01"

      �[32m+�[0m�[0m identity {
          �[32m+�[0m�[0m principal_id = (known after apply)
          �[32m+�[0m�[0m tenant_id    = (known after apply)
          �[32m+�[0m�[0m type         = "SystemAssigned"
        }
    }

�[1m  # azapi_resource.subnet_function�[0m will be created
�[0m  �[32m+�[0m�[0m resource "azapi_resource" "subnet_function" {
      �[32m+�[0m�[0m body                      = {
          �[32m+�[0m�[0m properties = {
              �[32m+�[0m�[0m addressPrefix                     = "10.3.0.192/26"
              �[32m+�[0m�[0m delegations                       = [
                  �[32m+�[0m�[0m {
                      �[32m+�[0m�[0m name       = "FunctionDelegation"
                      �[32m+�[0m�[0m properties = {
                          �[32m+�[0m�[0m serviceName = "Microsoft.Web/serverFarms"
                        }
                    },
                ]
              �[32m+�[0m�[0m ipAllocations                     = []
              �[32m+�[0m�[0m networkSecurityGroup              = {
                  �[32m+�[0m�[0m id = "/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/ptt-dev-networking-rg/providers/Microsoft.Network/networkSecurityGroups/ptt-dev-default-nsg001"
                }
              �[32m+�[0m�[0m privateEndpointNetworkPolicies    = "Enabled"
              �[32m+�[0m�[0m privateLinkServiceNetworkPolicies = "Enabled"
              �[32m+�[0m�[0m routeTable                        = {
                  �[32m+�[0m�[0m id = "/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/ptt-dev-networking-rg/providers/Microsoft.Network/routeTables/ptt-dev-default-rt001"
                }
              �[32m+�[0m�[0m serviceEndpointPolicies           = []
              �[32m+�[0m�[0m serviceEndpoints                  = []
            }
        }
      �[32m+�[0m�[0m id                        = (known after apply)
      �[32m+�[0m�[0m ignore_casing             = false
      �[32m+�[0m�[0m ignore_missing_property   = true
      �[32m+�[0m�[0m name                      = "FunctionSubnet"
      �[32m+�[0m�[0m output                    = (known after apply)
      �[32m+�[0m�[0m parent_id                 = "/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/ptt-dev-networking-rg/providers/Microsoft.Network/virtualNetworks/spoke-ptt-dev-vnet001"
      �[32m+�[0m�[0m schema_validation_enabled = true
      �[32m+�[0m�[0m type                      = "Microsoft.Network/virtualNetworks/subnets@2024-03-01"
    }

�[1m  # azapi_resource.subnet_private_endpoints�[0m will be created
�[0m  �[32m+�[0m�[0m resource "azapi_resource" "subnet_private_endpoints" {
      �[32m+�[0m�[0m body                      = {
          �[32m+�[0m�[0m properties = {
              �[32m+�[0m�[0m addressPrefix                     = "10.3.1.0/26"
              �[32m+�[0m�[0m delegations                       = []
              �[32m+�[0m�[0m ipAllocations                     = []
              �[32m+�[0m�[0m networkSecurityGroup              = {
                  �[32m+�[0m�[0m id = "/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/ptt-dev-networking-rg/providers/Microsoft.Network/networkSecurityGroups/ptt-dev-default-nsg001"
                }
              �[32m+�[0m�[0m privateEndpointNetworkPolicies    = "Enabled"
              �[32m+�[0m�[0m privateLinkServiceNetworkPolicies = "Enabled"
              �[32m+�[0m�[0m routeTable                        = {
                  �[32m+�[0m�[0m id = "/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/ptt-dev-networking-rg/providers/Microsoft.Network/routeTables/ptt-dev-default-rt001"
                }
              �[32m+�[0m�[0m serviceEndpointPolicies           = []
              �[32m+�[0m�[0m serviceEndpoints                  = []
            }
        }
      �[32m+�[0m�[0m id                        = (known after apply)
      �[32m+�[0m�[0m ignore_casing             = false
      �[32m+�[0m�[0m ignore_missing_property   = true
      �[32m+�[0m�[0m name                      = "PeSubnet"
      �[32m+�[0m�[0m output                    = (known after apply)
      �[32m+�[0m�[0m parent_id                 = "/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/ptt-dev-networking-rg/providers/Microsoft.Network/virtualNetworks/spoke-ptt-dev-vnet001"
      �[32m+�[0m�[0m schema_validation_enabled = true
      �[32m+�[0m�[0m type                      = "Microsoft.Network/virtualNetworks/subnets@2024-03-01"
    }

�[1m  # azurerm_key_vault_secret.key_vault_secret_sample�[0m will be created
�[0m  �[32m+�[0m�[0m resource "azurerm_key_vault_secret" "key_vault_secret_sample" {
      �[32m+�[0m�[0m content_type            = "text/plain"
      �[32m+�[0m�[0m id                      = (known after apply)
      �[32m+�[0m�[0m key_vault_id            = (known after apply)
      �[32m+�[0m�[0m name                    = "MySampleSecret"
      �[32m+�[0m�[0m resource_id             = (known after apply)
      �[32m+�[0m�[0m resource_versionless_id = (known after apply)
      �[32m+�[0m�[0m value                   = (sensitive value)
      �[32m+�[0m�[0m version                 = (known after apply)
      �[32m+�[0m�[0m versionless_id          = (known after apply)
    }

�[1m  # azurerm_monitor_action_group.monitor_action_group�[0m will be created
�[0m  �[32m+�[0m�[0m resource "azurerm_monitor_action_group" "monitor_action_group" {
      �[32m+�[0m�[0m enabled             = true
      �[32m+�[0m�[0m id                  = (known after apply)
      �[32m+�[0m�[0m location            = "global"
      �[32m+�[0m�[0m name                = "secfunc-dev-ag001"
      �[32m+�[0m�[0m resource_group_name = "secfunc-dev-logging-rg"
      �[32m+�[0m�[0m short_name          = "secfunc-dev"
    }

�[1m  # azurerm_monitor_activity_log_alert.monitor_activity_log_alert_service_health�[0m will be created
�[0m  �[32m+�[0m�[0m resource "azurerm_monitor_activity_log_alert" "monitor_activity_log_alert_service_health" {
      �[32m+�[0m�[0m description         = "Alerts about service health and maintenance events."
      �[32m+�[0m�[0m enabled             = true
      �[32m+�[0m�[0m id                  = (known after apply)
      �[32m+�[0m�[0m location            = "global"
      �[32m+�[0m�[0m name                = "secfunc-dev-alert-servicehealth"
      �[32m+�[0m�[0m resource_group_name = "secfunc-dev-logging-rg"
      �[32m+�[0m�[0m scopes              = [
          �[32m+�[0m�[0m "/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0",
        ]

      �[32m+�[0m�[0m action {
          �[32m+�[0m�[0m action_group_id    = (known after apply)
          �[32m+�[0m�[0m webhook_properties = {
              �[32m+�[0m�[0m "alert-type"   = "service-health"
              �[32m+�[0m�[0m "environment"  = "dev"
              �[32m+�[0m�[0m "location"     = "northeurope"
              �[32m+�[0m�[0m "severity"     = "Info"
              �[32m+�[0m�[0m "subscription" = "1fdab118-1638-419a-8b12-06c9543714a0"
            }
        }

      �[32m+�[0m�[0m criteria {
          �[32m+�[0m�[0m category = "ServiceHealth"

          �[32m+�[0m�[0m resource_health (known after apply)

          �[32m+�[0m�[0m service_health {
              �[32m+�[0m�[0m events    = [
                  �[32m+�[0m�[0m "Incident",
                  �[32m+�[0m�[0m "Maintenance",
                ]
              �[32m+�[0m�[0m locations = [
                  �[32m+�[0m�[0m "Global",
                  �[32m+�[0m�[0m "North Europe",
                ]
            }
        }
    }

�[1m  # azurerm_monitor_diagnostic_setting.diagnostic_setting_function�[0m will be created
�[0m  �[32m+�[0m�[0m resource "azurerm_monitor_diagnostic_setting" "diagnostic_setting_function" {
      �[32m+�[0m�[0m id                             = (known after apply)
      �[32m+�[0m�[0m log_analytics_destination_type = (known after apply)
      �[32m+�[0m�[0m log_analytics_workspace_id     = "/subscriptions/e82c5267-9dc4-4f45-ac13-abdd5e130d27/resourceGroups/ptt-dev-logging-rg/providers/Microsoft.OperationalInsights/workspaces/ptt-dev-log001"
      �[32m+�[0m�[0m name                           = "logAnalytics"
      �[32m+�[0m�[0m target_resource_id             = (known after apply)

      �[32m+�[0m�[0m enabled_log (known after apply)

      �[32m+�[0m�[0m metric (known after apply)
    }

�[1m  # azurerm_private_endpoint.function_private_endpoint�[0m will be created
�[0m  �[32m+�[0m�[0m resource "azurerm_private_endpoint" "function_private_endpoint" {
      �[32m+�[0m�[0m custom_dns_configs            = (known after apply)
      �[32m+�[0m�[0m custom_network_interface_name = "secfunc-dev-fctn001-nic"
      �[32m+�[0m�[0m id                            = (known after apply)
      �[32m+�[0m�[0m location                      = "northeurope"
      �[32m+�[0m�[0m name                          = "secfunc-dev-fctn001-pe"
      �[32m+�[0m�[0m network_interface             = (known after apply)
      �[32m+�[0m�[0m private_dns_zone_configs      = (known after apply)
      �[32m+�[0m�[0m resource_group_name           = "secfunc-dev-app-rg"
      �[32m+�[0m�[0m subnet_id                     = (known after apply)

      �[32m+�[0m�[0m private_dns_zone_group {
          �[32m+�[0m�[0m id                   = (known after apply)
          �[32m+�[0m�[0m name                 = "secfunc-dev-fctn001-arecord"
          �[32m+�[0m�[0m private_dns_zone_ids = [
              �[32m+�[0m�[0m "/subscriptions/e82c5267-9dc4-4f45-ac13-abdd5e130d27/resourceGroups/ptt-dev-privatedns-rg/providers/Microsoft.Network/privateDnsZones/privatelink.azurewebsites.net",
            ]
        }

      �[32m+�[0m�[0m private_service_connection {
          �[32m+�[0m�[0m is_manual_connection           = false
          �[32m+�[0m�[0m name                           = "secfunc-dev-fctn001-pe"
          �[32m+�[0m�[0m private_connection_resource_id = (known after apply)
          �[32m+�[0m�[0m private_ip_address             = (known after apply)
          �[32m+�[0m�[0m subresource_names              = [
              �[32m+�[0m�[0m "sites",
            ]
        }
    }

�[1m  # azurerm_resource_group.app_rg�[0m will be created
�[0m  �[32m+�[0m�[0m resource "azurerm_resource_group" "app_rg" {
      �[32m+�[0m�[0m id       = (known after apply)
      �[32m+�[0m�[0m location = "northeurope"
      �[32m+�[0m�[0m name     = "secfunc-dev-app-rg"
    }

�[1m  # azurerm_resource_group.logging_rg�[0m will be created
�[0m  �[32m+�[0m�[0m resource "azurerm_resource_group" "logging_rg" {
      �[32m+�[0m�[0m id       = (known after apply)
      �[32m+�[0m�[0m location = "northeurope"
      �[32m+�[0m�[0m name     = "secfunc-dev-logging-rg"
    }

�[1m  # azurerm_role_assignment.function_role_assignment_key_vault�[0m will be created
�[0m  �[32m+�[0m�[0m resource "azurerm_role_assignment" "function_role_assignment_key_vault" {
      �[32m+�[0m�[0m id                               = (known after apply)
      �[32m+�[0m�[0m name                             = (known after apply)
      �[32m+�[0m�[0m principal_id                     = (known after apply)
      �[32m+�[0m�[0m principal_type                   = (known after apply)
      �[32m+�[0m�[0m role_definition_id               = (known after apply)
      �[32m+�[0m�[0m role_definition_name             = "Key Vault Secrets Officer"
      �[32m+�[0m�[0m scope                            = (known after apply)
      �[32m+�[0m�[0m skip_service_principal_aad_check = (known after apply)
    }

�[1m  # azurerm_role_assignment.function_role_assignment_storage_blob_data_owner�[0m will be created
�[0m  �[32m+�[0m�[0m resource "azurerm_role_assignment" "function_role_assignment_storage_blob_data_owner" {
      �[32m+�[0m�[0m id                               = (known after apply)
      �[32m+�[0m�[0m name                             = (known after apply)
      �[32m+�[0m�[0m principal_id                     = (known after apply)
      �[32m+�[0m�[0m principal_type                   = (known after apply)
      �[32m+�[0m�[0m role_definition_id               = (known after apply)
      �[32m+�[0m�[0m role_definition_name             = "Storage Blob Data Owner"
      �[32m+�[0m�[0m scope                            = (known after apply)
      �[32m+�[0m�[0m skip_service_principal_aad_check = (known after apply)
    }

�[1m  # module.app_service_plan.data.azurerm_monitor_diagnostic_categories.diagnostic_categories_service_plan�[0m will be read during apply
  # (config refers to values not yet known)
�[0m �[36m<=�[0m�[0m data "azurerm_monitor_diagnostic_categories" "diagnostic_categories_service_plan" {
      �[32m+�[0m�[0m id                  = (known after apply)
      �[32m+�[0m�[0m log_category_groups = (known after apply)
      �[32m+�[0m�[0m log_category_types  = (known after apply)
      �[32m+�[0m�[0m metrics             = (known after apply)
      �[32m+�[0m�[0m resource_id         = (known after apply)
    }

�[1m  # module.app_service_plan.azurerm_monitor_diagnostic_setting.diagnostic_setting_service_plan["0"]�[0m will be created
�[0m  �[32m+�[0m�[0m resource "azurerm_monitor_diagnostic_setting" "diagnostic_setting_service_plan" {
      �[32m+�[0m�[0m id                             = (known after apply)
      �[32m+�[0m�[0m log_analytics_destination_type = (known after apply)
      �[32m+�[0m�[0m log_analytics_workspace_id     = "/subscriptions/e82c5267-9dc4-4f45-ac13-abdd5e130d27/resourceGroups/ptt-dev-logging-rg/providers/Microsoft.OperationalInsights/workspaces/ptt-dev-log001"
      �[32m+�[0m�[0m name                           = "applicationLogs-0"
      �[32m+�[0m�[0m target_resource_id             = (known after apply)

      �[32m+�[0m�[0m enabled_log (known after apply)

      �[32m+�[0m�[0m metric (known after apply)
    }

�[1m  # module.app_service_plan.azurerm_service_plan.service_plan�[0m will be created
�[0m  �[32m+�[0m�[0m resource "azurerm_service_plan" "service_plan" {
      �[32m+�[0m�[0m id                           = (known after apply)
      �[32m+�[0m�[0m kind                         = (known after apply)
      �[32m+�[0m�[0m location                     = "northeurope"
      �[32m+�[0m�[0m maximum_elastic_worker_count = (known after apply)
      �[32m+�[0m�[0m name                         = "secfunc-dev-asp001"
      �[32m+�[0m�[0m os_type                      = "Linux"
      �[32m+�[0m�[0m per_site_scaling_enabled     = false
      �[32m+�[0m�[0m reserved                     = (known after apply)
      �[32m+�[0m�[0m resource_group_name          = "secfunc-dev-app-rg"
      �[32m+�[0m�[0m sku_name                     = "EP1"
      �[32m+�[0m�[0m worker_count                 = 1
      �[32m+�[0m�[0m zone_balancing_enabled       = false
    }

�[1m  # module.application_insights.data.azurerm_monitor_diagnostic_categories.diagnostic_categories_application_insights�[0m will be read during apply
  # (config refers to values not yet known)
�[0m �[36m<=�[0m�[0m data "azurerm_monitor_diagnostic_categories" "diagnostic_categories_application_insights" {
      �[32m+�[0m�[0m id                  = (known after apply)
      �[32m+�[0m�[0m log_category_groups = (known after apply)
      �[32m+�[0m�[0m log_category_types  = (known after apply)
      �[32m+�[0m�[0m metrics             = (known after apply)
      �[32m+�[0m�[0m resource_id         = (known after apply)
    }

�[1m  # module.application_insights.azurerm_application_insights.application_insights�[0m will be created
�[0m  �[32m+�[0m�[0m resource "azurerm_application_insights" "application_insights" {
      �[32m+�[0m�[0m app_id                                = (known after apply)
      �[32m+�[0m�[0m application_type                      = "other"
      �[32m+�[0m�[0m connection_string                     = (sensitive value)
      �[32m+�[0m�[0m daily_data_cap_in_gb                  = 100
      �[32m+�[0m�[0m daily_data_cap_notifications_disabled = false
      �[32m+�[0m�[0m disable_ip_masking                    = false
      �[32m+�[0m�[0m force_customer_storage_for_profiler   = false
      �[32m+�[0m�[0m id                                    = (known after apply)
      �[32m+�[0m�[0m instrumentation_key                   = (sensitive value)
      �[32m+�[0m�[0m internet_ingestion_enabled            = true
      �[32m+�[0m�[0m internet_query_enabled                = true
      �[32m+�[0m�[0m local_authentication_disabled         = false
      �[32m+�[0m�[0m location                              = "northeurope"
      �[32m+�[0m�[0m name                                  = "secfunc-dev-appi001"
      �[32m+�[0m�[0m resource_group_name                   = "secfunc-dev-logging-rg"
      �[32m+�[0m�[0m retention_in_days                     = 90
      �[32m+�[0m�[0m sampling_percentage                   = 100
      �[32m+�[0m�[0m workspace_id                          = "/subscriptions/e82c5267-9dc4-4f45-ac13-abdd5e130d27/resourceGroups/ptt-dev-logging-rg/providers/Microsoft.OperationalInsights/workspaces/ptt-dev-log001"
    }

�[1m  # module.key_vault.data.azurerm_monitor_diagnostic_categories.diagnostic_categories_key_vault�[0m will be read during apply
  # (config refers to values not yet known)
�[0m �[36m<=�[0m�[0m data "azurerm_monitor_diagnostic_categories" "diagnostic_categories_key_vault" {
      �[32m+�[0m�[0m id                  = (known after apply)
      �[32m+�[0m�[0m log_category_groups = (known after apply)
      �[32m+�[0m�[0m log_category_types  = (known after apply)
      �[32m+�[0m�[0m metrics             = (known after apply)
      �[32m+�[0m�[0m resource_id         = (known after apply)
    }

�[1m  # module.key_vault.azurerm_key_vault.key_vault�[0m will be created
�[0m  �[32m+�[0m�[0m resource "azurerm_key_vault" "key_vault" {
      �[32m+�[0m�[0m access_policy                   = []
      �[32m+�[0m�[0m enable_rbac_authorization       = true
      �[32m+�[0m�[0m enabled_for_deployment          = false
      �[32m+�[0m�[0m enabled_for_disk_encryption     = false
      �[32m+�[0m�[0m enabled_for_template_deployment = false
      �[32m+�[0m�[0m id                              = (known after apply)
      �[32m+�[0m�[0m location                        = "northeurope"
      �[32m+�[0m�[0m name                            = "secfunc-dev-kv001"
      �[32m+�[0m�[0m public_network_access_enabled   = false
      �[32m+�[0m�[0m purge_protection_enabled        = true
      �[32m+�[0m�[0m resource_group_name             = "secfunc-dev-app-rg"
      �[32m+�[0m�[0m sku_name                        = "standard"
      �[32m+�[0m�[0m soft_delete_retention_days      = 7
      �[32m+�[0m�[0m tenant_id                       = "37963dd4-f4e6-40f8-a7d6-24b97919e452"
      �[32m+�[0m�[0m vault_uri                       = (known after apply)

      �[32m+�[0m�[0m contact (known after apply)

      �[32m+�[0m�[0m network_acls {
          �[32m+�[0m�[0m bypass         = "AzureServices"
          �[32m+�[0m�[0m default_action = "Deny"
        }
    }

�[1m  # module.key_vault.azurerm_monitor_diagnostic_setting.diagnostic_setting_key_vault["0"]�[0m will be created
�[0m  �[32m+�[0m�[0m resource "azurerm_monitor_diagnostic_setting" "diagnostic_setting_key_vault" {
      �[32m+�[0m�[0m id                             = (known after apply)
      �[32m+�[0m�[0m log_analytics_destination_type = (known after apply)
      �[32m+�[0m�[0m log_analytics_workspace_id     = "/subscriptions/e82c5267-9dc4-4f45-ac13-abdd5e130d27/resourceGroups/ptt-dev-logging-rg/providers/Microsoft.OperationalInsights/workspaces/ptt-dev-log001"
      �[32m+�[0m�[0m name                           = "applicationLogs-0"
      �[32m+�[0m�[0m target_resource_id             = (known after apply)

      �[32m+�[0m�[0m enabled_log (known after apply)

      �[32m+�[0m�[0m metric (known after apply)
    }

�[1m  # module.key_vault.azurerm_private_endpoint.private_endpoint_cognitive_account_vault�[0m will be created
�[0m  �[32m+�[0m�[0m resource "azurerm_private_endpoint" "private_endpoint_cognitive_account_vault" {
      �[32m+�[0m�[0m custom_dns_configs            = (known after apply)
      �[32m+�[0m�[0m custom_network_interface_name = "secfunc-dev-kv001-vault-nic"
      �[32m+�[0m�[0m id                            = (known after apply)
      �[32m+�[0m�[0m location                      = "northeurope"
      �[32m+�[0m�[0m name                          = "secfunc-dev-kv001-vault-pe"
      �[32m+�[0m�[0m network_interface             = (known after apply)
      �[32m+�[0m�[0m private_dns_zone_configs      = (known after apply)
      �[32m+�[0m�[0m resource_group_name           = "secfunc-dev-app-rg"
      �[32m+�[0m�[0m subnet_id                     = (known after apply)

      �[32m+�[0m�[0m private_dns_zone_group {
          �[32m+�[0m�[0m id                   = (known after apply)
          �[32m+�[0m�[0m name                 = "secfunc-dev-kv001-arecord"
          �[32m+�[0m�[0m private_dns_zone_ids = [
              �[32m+�[0m�[0m "/subscriptions/e82c5267-9dc4-4f45-ac13-abdd5e130d27/resourceGroups/ptt-dev-privatedns-rg/providers/Microsoft.Network/privateDnsZones/privatelink.vaultcore.azure.net",
            ]
        }

      �[32m+�[0m�[0m private_service_connection {
          �[32m+�[0m�[0m is_manual_connection           = false
          �[32m+�[0m�[0m name                           = "secfunc-dev-kv001-vault-svc"
          �[32m+�[0m�[0m private_connection_resource_id = (known after apply)
          �[32m+�[0m�[0m private_ip_address             = (known after apply)
          �[32m+�[0m�[0m subresource_names              = [
              �[32m+�[0m�[0m "vault",
            ]
        }
    }

�[1m  # module.key_vault.azurerm_role_assignment.current_roleassignment_key_vault�[0m will be created
�[0m  �[32m+�[0m�[0m resource "azurerm_role_assignment" "current_roleassignment_key_vault" {
      �[32m+�[0m�[0m id                               = (known after apply)
      �[32m+�[0m�[0m name                             = (known after apply)
      �[32m+�[0m�[0m principal_id                     = "973df2ad-4e5e-4e8b-9df6-17f61e9efd55"
      �[32m+�[0m�[0m principal_type                   = (known after apply)
      �[32m+�[0m�[0m role_definition_id               = (known after apply)
      �[32m+�[0m�[0m role_definition_name             = "Key Vault Administrator"
      �[32m+�[0m�[0m scope                            = (known after apply)
      �[32m+�[0m�[0m skip_service_principal_aad_check = (known after apply)
    }

�[1m  # module.key_vault.time_sleep.sleep_connectivity�[0m will be created
�[0m  �[32m+�[0m�[0m resource "time_sleep" "sleep_connectivity" {
      �[32m+�[0m�[0m create_duration = "120s"
      �[32m+�[0m�[0m id              = (known after apply)
    }

�[1m  # module.storage_account.data.azurerm_monitor_diagnostic_categories.diagnostic_categories_storage_account�[0m will be read during apply
  # (config refers to values not yet known)
�[0m �[36m<=�[0m�[0m data "azurerm_monitor_diagnostic_categories" "diagnostic_categories_storage_account" {
      �[32m+�[0m�[0m id                  = (known after apply)
      �[32m+�[0m�[0m log_category_groups = (known after apply)
      �[32m+�[0m�[0m log_category_types  = (known after apply)
      �[32m+�[0m�[0m metrics             = (known after apply)
      �[32m+�[0m�[0m resource_id         = (known after apply)
    }

�[1m  # module.storage_account.azurerm_monitor_diagnostic_setting.diagnostic_setting_storage_account["0"]�[0m will be created
�[0m  �[32m+�[0m�[0m resource "azurerm_monitor_diagnostic_setting" "diagnostic_setting_storage_account" {
      �[32m+�[0m�[0m id                             = (known after apply)
      �[32m+�[0m�[0m log_analytics_destination_type = (known after apply)
      �[32m+�[0m�[0m log_analytics_workspace_id     = "/subscriptions/e82c5267-9dc4-4f45-ac13-abdd5e130d27/resourceGroups/ptt-dev-logging-rg/providers/Microsoft.OperationalInsights/workspaces/ptt-dev-log001"
      �[32m+�[0m�[0m name                           = "applicationLogs-0"
      �[32m+�[0m�[0m target_resource_id             = (known after apply)

      �[32m+�[0m�[0m enabled_log (known after apply)

      �[32m+�[0m�[0m metric (known after apply)
    }

�[1m  # module.storage_account.azurerm_private_endpoint.private_endpoint_storage_account["blob"]�[0m will be created
�[0m  �[32m+�[0m�[0m resource "azurerm_private_endpoint" "private_endpoint_storage_account" {
      �[32m+�[0m�[0m custom_dns_configs            = (known after apply)
      �[32m+�[0m�[0m custom_network_interface_name = "secfuncdevstg001-blob-nic"
      �[32m+�[0m�[0m id                            = (known after apply)
      �[32m+�[0m�[0m location                      = "northeurope"
      �[32m+�[0m�[0m name                          = "secfuncdevstg001-blob-pe"
      �[32m+�[0m�[0m network_interface             = (known after apply)
      �[32m+�[0m�[0m private_dns_zone_configs      = (known after apply)
      �[32m+�[0m�[0m resource_group_name           = "secfunc-dev-app-rg"
      �[32m+�[0m�[0m subnet_id                     = (known after apply)

      �[32m+�[0m�[0m private_dns_zone_group {
          �[32m+�[0m�[0m id                   = (known after apply)
          �[32m+�[0m�[0m name                 = "secfuncdevstg001-arecord"
          �[32m+�[0m�[0m private_dns_zone_ids = [
              �[32m+�[0m�[0m "/subscriptions/e82c5267-9dc4-4f45-ac13-abdd5e130d27/resourceGroups/ptt-dev-privatedns-rg/providers/Microsoft.Network/privateDnsZones/privatelink.blob.core.windows.net",
            ]
        }

      �[32m+�[0m�[0m private_service_connection {
          �[32m+�[0m�[0m is_manual_connection           = false
          �[32m+�[0m�[0m name                           = "secfuncdevstg001-blob-svc"
          �[32m+�[0m�[0m private_connection_resource_id = (known after apply)
          �[32m+�[0m�[0m private_ip_address             = (known after apply)
          �[32m+�[0m�[0m subresource_names              = [
              �[32m+�[0m�[0m "blob",
            ]
        }
    }

�[1m  # module.storage_account.azurerm_private_endpoint.private_endpoint_storage_account["file"]�[0m will be created
�[0m  �[32m+�[0m�[0m resource "azurerm_private_endpoint" "private_endpoint_storage_account" {
      �[32m+�[0m�[0m custom_dns_configs            = (known after apply)
      �[32m+�[0m�[0m custom_network_interface_name = "secfuncdevstg001-file-nic"
      �[32m+�[0m�[0m id                            = (known after apply)
      �[32m+�[0m�[0m location                      = "northeurope"
      �[32m+�[0m�[0m name                          = "secfuncdevstg001-file-pe"
      �[32m+�[0m�[0m network_interface             = (known after apply)
      �[32m+�[0m�[0m private_dns_zone_configs      = (known after apply)
      �[32m+�[0m�[0m resource_group_name           = "secfunc-dev-app-rg"
      �[32m+�[0m�[0m subnet_id                     = (known after apply)

      �[32m+�[0m�[0m private_dns_zone_group {
          �[32m+�[0m�[0m id                   = (known after apply)
          �[32m+�[0m�[0m name                 = "secfuncdevstg001-arecord"
          �[32m+�[0m�[0m private_dns_zone_ids = [
              �[32m+�[0m�[0m "/subscriptions/e82c5267-9dc4-4f45-ac13-abdd5e130d27/resourceGroups/ptt-dev-privatedns-rg/providers/Microsoft.Network/privateDnsZones/privatelink.file.core.windows.net",
            ]
        }

      �[32m+�[0m�[0m private_service_connection {
          �[32m+�[0m�[0m is_manual_connection           = false
          �[32m+�[0m�[0m name                           = "secfuncdevstg001-file-svc"
          �[32m+�[0m�[0m private_connection_resource_id = (known after apply)
          �[32m+�[0m�[0m private_ip_address             = (known after apply)
          �[32m+�[0m�[0m subresource_names              = [
              �[32m+�[0m�[0m "file",
            ]
        }
    }

�[1m  # module.storage_account.azurerm_private_endpoint.private_endpoint_storage_account["queue"]�[0m will be created
�[0m  �[32m+�[0m�[0m resource "azurerm_private_endpoint" "private_endpoint_storage_account" {
      �[32m+�[0m�[0m custom_dns_configs            = (known after apply)
      �[32m+�[0m�[0m custom_network_interface_name = "secfuncdevstg001-queue-nic"
      �[32m+�[0m�[0m id                            = (known after apply)
      �[32m+�[0m�[0m location                      = "northeurope"
      �[32m+�[0m�[0m name                          = "secfuncdevstg001-queue-pe"
      �[32m+�[0m�[0m network_interface             = (known after apply)
      �[32m+�[0m�[0m private_dns_zone_configs      = (known after apply)
      �[32m+�[0m�[0m resource_group_name           = "secfunc-dev-app-rg"
      �[32m+�[0m�[0m subnet_id                     = (known after apply)

      �[32m+�[0m�[0m private_dns_zone_group {
          �[32m+�[0m�[0m id                   = (known after apply)
          �[32m+�[0m�[0m name                 = "secfuncdevstg001-arecord"
          �[32m+�[0m�[0m private_dns_zone_ids = [
              �[32m+�[0m�[0m "/subscriptions/e82c5267-9dc4-4f45-ac13-abdd5e130d27/resourceGroups/ptt-dev-privatedns-rg/providers/Microsoft.Network/privateDnsZones/privatelink.queue.core.windows.net",
            ]
        }

      �[32m+�[0m�[0m private_service_connection {
          �[32m+�[0m�[0m is_manual_connection           = false
          �[32m+�[0m�[0m name                           = "secfuncdevstg001-queue-svc"
          �[32m+�[0m�[0m private_connection_resource_id = (known after apply)
          �[32m+�[0m�[0m private_ip_address             = (known after apply)
          �[32m+�[0m�[0m subresource_names              = [
              �[32m+�[0m�[0m "queue",
            ]
        }
    }

�[1m  # module.storage_account.azurerm_private_endpoint.private_endpoint_storage_account["table"]�[0m will be created
�[0m  �[32m+�[0m�[0m resource "azurerm_private_endpoint" "private_endpoint_storage_account" {
      �[32m+�[0m�[0m custom_dns_configs            = (known after apply)
      �[32m+�[0m�[0m custom_network_interface_name = "secfuncdevstg001-table-nic"
      �[32m+�[0m�[0m id                            = (known after apply)
      �[32m+�[0m�[0m location                      = "northeurope"
      �[32m+�[0m�[0m name                          = "secfuncdevstg001-table-pe"
      �[32m+�[0m�[0m network_interface             = (known after apply)
      �[32m+�[0m�[0m private_dns_zone_configs      = (known after apply)
      �[32m+�[0m�[0m resource_group_name           = "secfunc-dev-app-rg"
      �[32m+�[0m�[0m subnet_id                     = (known after apply)

      �[32m+�[0m�[0m private_dns_zone_group {
          �[32m+�[0m�[0m id                   = (known after apply)
          �[32m+�[0m�[0m name                 = "secfuncdevstg001-arecord"
          �[32m+�[0m�[0m private_dns_zone_ids = [
              �[32m+�[0m�[0m "/subscriptions/e82c5267-9dc4-4f45-ac13-abdd5e130d27/resourceGroups/ptt-dev-privatedns-rg/providers/Microsoft.Network/privateDnsZones/privatelink.table.core.windows.net",
            ]
        }

      �[32m+�[0m�[0m private_service_connection {
          �[32m+�[0m�[0m is_manual_connection           = false
          �[32m+�[0m�[0m name                           = "secfuncdevstg001-table-svc"
          �[32m+�[0m�[0m private_connection_resource_id = (known after apply)
          �[32m+�[0m�[0m private_ip_address             = (known after apply)
          �[32m+�[0m�[0m subresource_names              = [
              �[32m+�[0m�[0m "table",
            ]
        }
    }

�[1m  # module.storage_account.azurerm_role_assignment.current_roleassignment_storage_blob_data_owner�[0m will be created
�[0m  �[32m+�[0m�[0m resource "azurerm_role_assignment" "current_roleassignment_storage_blob_data_owner" {
      �[32m+�[0m�[0m description                      = "Required for creating data plane artifacts"
      �[32m+�[0m�[0m id                               = (known after apply)
      �[32m+�[0m�[0m name                             = (known after apply)
      �[32m+�[0m�[0m principal_id                     = "973df2ad-4e5e-4e8b-9df6-17f61e9efd55"
      �[32m+�[0m�[0m principal_type                   = "ServicePrincipal"
      �[32m+�[0m�[0m role_definition_id               = (known after apply)
      �[32m+�[0m�[0m role_definition_name             = "Storage Blob Data Owner"
      �[32m+�[0m�[0m scope                            = (known after apply)
      �[32m+�[0m�[0m skip_service_principal_aad_check = (known after apply)
    }

�[1m  # module.storage_account.azurerm_storage_account.storage_account�[0m will be created
�[0m  �[32m+�[0m�[0m resource "azurerm_storage_account" "storage_account" {
      �[32m+�[0m�[0m access_tier                        = "Hot"
      �[32m+�[0m�[0m account_kind                       = "StorageV2"
      �[32m+�[0m�[0m account_replication_type           = "ZRS"
      �[32m+�[0m�[0m account_tier                       = "Standard"
      �[32m+�[0m�[0m allow_nested_items_to_be_public    = false
      �[32m+�[0m�[0m allowed_copy_scope                 = "AAD"
      �[32m+�[0m�[0m cross_tenant_replication_enabled   = false
      �[32m+�[0m�[0m default_to_oauth_authentication    = true
      �[32m+�[0m�[0m dns_endpoint_type                  = "Standard"
      �[32m+�[0m�[0m https_traffic_only_enabled         = true
      �[32m+�[0m�[0m id                                 = (known after apply)
      �[32m+�[0m�[0m infrastructure_encryption_enabled  = true
      �[32m+�[0m�[0m is_hns_enabled                     = false
      �[32m+�[0m�[0m large_file_share_enabled           = false
      �[32m+�[0m�[0m local_user_enabled                 = true
      �[32m+�[0m�[0m location                           = "northeurope"
      �[32m+�[0m�[0m min_tls_version                    = "TLS1_2"
      �[32m+�[0m�[0m name                               = "secfuncdevstg001"
      �[32m+�[0m�[0m nfsv3_enabled                      = false
      �[32m+�[0m�[0m primary_access_key                 = (sensitive value)
      �[32m+�[0m�[0m primary_blob_connection_string     = (sensitive value)
      �[32m+�[0m�[0m primary_blob_endpoint              = (known after apply)
      �[32m+�[0m�[0m primary_blob_host                  = (known after apply)
      �[32m+�[0m�[0m primary_blob_internet_endpoint     = (known after apply)
      �[32m+�[0m�[0m primary_blob_internet_host         = (known after apply)
      �[32m+�[0m�[0m primary_blob_microsoft_endpoint    = (known after apply)
      �[32m+�[0m�[0m primary_blob_microsoft_host        = (known after apply)
      �[32m+�[0m�[0m primary_connection_string          = (sensitive value)
      �[32m+�[0m�[0m primary_dfs_endpoint               = (known after apply)
      �[32m+�[0m�[0m primary_dfs_host                   = (known after apply)
      �[32m+�[0m�[0m primary_dfs_internet_endpoint      = (known after apply)
      �[32m+�[0m�[0m primary_dfs_internet_host          = (known after apply)
      �[32m+�[0m�[0m primary_dfs_microsoft_endpoint     = (known after apply)
      �[32m+�[0m�[0m primary_dfs_microsoft_host         = (known after apply)
      �[32m+�[0m�[0m primary_file_endpoint              = (known after apply)
      �[32m+�[0m�[0m primary_file_host                  = (known after apply)
      �[32m+�[0m�[0m primary_file_internet_endpoint     = (known after apply)
      �[32m+�[0m�[0m primary_file_internet_host         = (known after apply)
      �[32m+�[0m�[0m primary_file_microsoft_endpoint    = (known after apply)
      �[32m+�[0m�[0m primary_file_microsoft_host        = (known after apply)
      �[32m+�[0m�[0m primary_location                   = (known after apply)
      �[32m+�[0m�[0m primary_queue_endpoint             = (known after apply)
      �[32m+�[0m�[0m primary_queue_host                 = (known after apply)
      �[32m+�[0m�[0m primary_queue_microsoft_endpoint   = (known after apply)
      �[32m+�[0m�[0m primary_queue_microsoft_host       = (known after apply)
      �[32m+�[0m�[0m primary_table_endpoint             = (known after apply)
      �[32m+�[0m�[0m primary_table_host                 = (known after apply)
      �[32m+�[0m�[0m primary_table_microsoft_endpoint   = (known after apply)
      �[32m+�[0m�[0m primary_table_microsoft_host       = (known after apply)
      �[32m+�[0m�[0m primary_web_endpoint               = (known after apply)
      �[32m+�[0m�[0m primary_web_host                   = (known after apply)
      �[32m+�[0m�[0m primary_web_internet_endpoint      = (known after apply)
      �[32m+�[0m�[0m primary_web_internet_host          = (known after apply)
      �[32m+�[0m�[0m primary_web_microsoft_endpoint     = (known after apply)
      �[32m+�[0m�[0m primary_web_microsoft_host         = (known after apply)
      �[32m+�[0m�[0m public_network_access_enabled      = false
      �[32m+�[0m�[0m queue_encryption_key_type          = "Account"
      �[32m+�[0m�[0m resource_group_name                = "secfunc-dev-app-rg"
      �[32m+�[0m�[0m secondary_access_key               = (sensitive value)
      �[32m+�[0m�[0m secondary_blob_connection_string   = (sensitive value)
      �[32m+�[0m�[0m secondary_blob_endpoint            = (known after apply)
      �[32m+�[0m�[0m secondary_blob_host                = (known after apply)
      �[32m+�[0m�[0m secondary_blob_internet_endpoint   = (known after apply)
      �[32m+�[0m�[0m secondary_blob_internet_host       = (known after apply)
      �[32m+�[0m�[0m secondary_blob_microsoft_endpoint  = (known after apply)
      �[32m+�[0m�[0m secondary_blob_microsoft_host      = (known after apply)
      �[32m+�[0m�[0m secondary_connection_string        = (sensitive value)
      �[32m+�[0m�[0m secondary_dfs_endpoint             = (known after apply)
      �[32m+�[0m�[0m secondary_dfs_host                 = (known after apply)
      �[32m+�[0m�[0m secondary_dfs_internet_endpoint    = (known after apply)
      �[32m+�[0m�[0m secondary_dfs_internet_host        = (known after apply)
      �[32m+�[0m�[0m secondary_dfs_microsoft_endpoint   = (known after apply)
      �[32m+�[0m�[0m secondary_dfs_microsoft_host       = (known after apply)
      �[32m+�[0m�[0m secondary_file_endpoint            = (known after apply)
      �[32m+�[0m�[0m secondary_file_host                = (known after apply)
      �[32m+�[0m�[0m secondary_file_internet_endpoint   = (known after apply)
      �[32m+�[0m�[0m secondary_file_internet_host       = (known after apply)
      �[32m+�[0m�[0m secondary_file_microsoft_endpoint  = (known after apply)
      �[32m+�[0m�[0m secondary_file_microsoft_host      = (known after apply)
      �[32m+�[0m�[0m secondary_location                 = (known after apply)
      �[32m+�[0m�[0m secondary_queue_endpoint           = (known after apply)
      �[32m+�[0m�[0m secondary_queue_host               = (known after apply)
      �[32m+�[0m�[0m secondary_queue_microsoft_endpoint = (known after apply)
      �[32m+�[0m�[0m secondary_queue_microsoft_host     = (known after apply)
      �[32m+�[0m�[0m secondary_table_endpoint           = (known after apply)
      �[32m+�[0m�[0m secondary_table_host               = (known after apply)
      �[32m+�[0m�[0m secondary_table_microsoft_endpoint = (known after apply)
      �[32m+�[0m�[0m secondary_table_microsoft_host     = (known after apply)
      �[32m+�[0m�[0m secondary_web_endpoint             = (known after apply)
      �[32m+�[0m�[0m secondary_web_host                 = (known after apply)
      �[32m+�[0m�[0m secondary_web_internet_endpoint    = (known after apply)
      �[32m+�[0m�[0m secondary_web_internet_host        = (known after apply)
      �[32m+�[0m�[0m secondary_web_microsoft_endpoint   = (known after apply)
      �[32m+�[0m�[0m secondary_web_microsoft_host       = (known after apply)
      �[32m+�[0m�[0m sftp_enabled                       = false
      �[32m+�[0m�[0m shared_access_key_enabled          = false
      �[32m+�[0m�[0m table_encryption_key_type          = "Account"

      �[32m+�[0m�[0m blob_properties {
          �[32m+�[0m�[0m change_feed_enabled      = false
          �[32m+�[0m�[0m default_service_version  = (known after apply)
          �[32m+�[0m�[0m last_access_time_enabled = false
          �[32m+�[0m�[0m versioning_enabled       = false

          �[32m+�[0m�[0m container_delete_retention_policy {
              �[32m+�[0m�[0m days = 7
            }

          �[32m+�[0m�[0m delete_retention_policy {
              �[32m+�[0m�[0m days                     = 7
              �[32m+�[0m�[0m permanent_delete_enabled = false
            }
        }

      �[32m+�[0m�[0m network_rules {
          �[32m+�[0m�[0m bypass                     = [
              �[32m+�[0m�[0m "None",
            ]
          �[32m+�[0m�[0m default_action             = "Deny"
          �[32m+�[0m�[0m ip_rules                   = (known after apply)
          �[32m+�[0m�[0m virtual_network_subnet_ids = (known after apply)

          �[32m+�[0m�[0m private_link_access {
              �[32m+�[0m�[0m endpoint_resource_id = "/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/providers/Microsoft.Security/datascanners/storageDataScanner"
              �[32m+�[0m�[0m endpoint_tenant_id   = "37963dd4-f4e6-40f8-a7d6-24b97919e452"
            }
        }

      �[32m+�[0m�[0m queue_properties (known after apply)

      �[32m+�[0m�[0m routing {
          �[32m+�[0m�[0m choice                      = "MicrosoftRouting"
          �[32m+�[0m�[0m publish_internet_endpoints  = false
          �[32m+�[0m�[0m publish_microsoft_endpoints = false
        }

      �[32m+�[0m�[0m sas_policy {
          �[32m+�[0m�[0m expiration_action = "Log"
          �[32m+�[0m�[0m expiration_period = "1.00:00:00"
        }

      �[32m+�[0m�[0m share_properties (known after apply)
    }

�[1m  # module.storage_account.time_sleep.sleep_connectivity�[0m will be created
�[0m  �[32m+�[0m�[0m resource "time_sleep" "sleep_connectivity" {
      �[32m+�[0m�[0m create_duration = "120s"
      �[32m+�[0m�[0m id              = (known after apply)
    }

�[1mPlan:�[0m 28 to add, 0 to change, 0 to destroy.
�[0m�[90m
─────────────────────────────────────────────────────────────────────────────�[0m

Note: You didn't use the -out option to save this plan, so Terraform can't
guarantee to take exactly these actions if you run "terraform apply" now.
Releasing state lock. This may take a few moments...

Copy link

github-actions bot commented Nov 4, 2024

Terraform Lint Results

  • Terraform Version 📎1.9.6
  • Working Directory 📂./code/infra
  • Terraform Format and Style 🖌success

Copy link

github-actions bot commented Nov 4, 2024

Terraform Validation & Plan Results

  • Terraform Version 📎1.9.6
  • Working Directory 📂./code/infra
  • Terraform Initialization ⚙️success
  • Terraform Validation 🤖success
  • Terraform Plan 📖success
Show Plan

terraform
Acquiring state lock. This may take a few moments...
�[0m�[1mdata.azurerm_location.current: Reading...�[0m�[0m
�[0m�[1mdata.azurerm_subscription.current: Reading...�[0m�[0m
�[0m�[1mdata.azurerm_route_table.route_table: Reading...�[0m�[0m
�[0m�[1mmodule.storage_account.data.azurerm_client_config.current: Reading...�[0m�[0m
�[0m�[1mdata.azurerm_virtual_network.virtual_network: Reading...�[0m�[0m
�[0m�[1mdata.azurerm_network_security_group.network_security_group: Reading...�[0m�[0m
�[0m�[1mmodule.key_vault.data.azurerm_client_config.current: Reading...�[0m�[0m
�[0m�[1mazurerm_resource_group.app_rg: Refreshing state... [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/secfunc-dev-app-rg]�[0m
�[0m�[1mazurerm_resource_group.logging_rg: Refreshing state... [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/secfunc-dev-logging-rg]�[0m
�[0m�[1mdata.azurerm_client_config.current: Reading...�[0m�[0m
�[0m�[1mmodule.storage_account.data.azurerm_client_config.current: Read complete after 0s [id=Y2xpZW50Q29uZmlncy9jbGllbnRJZD1lNWRmNjg0My1lYmRlLTRkNzktOWM3ZS03NDMxYTNjZDQzZDI7b2JqZWN0SWQ9OTczZGYyYWQtNGU1ZS00ZThiLTlkZjYtMTdmNjFlOWVmZDU1O3N1YnNjcmlwdGlvbklkPTFmZGFiMTE4LTE2MzgtNDE5YS04YjEyLTA2Yzk1NDM3MTRhMDt0ZW5hbnRJZD0zNzk2M2RkNC1mNGU2LTQwZjgtYTdkNi0yNGI5NzkxOWU0NTI=]�[0m
�[0m�[1mmodule.key_vault.data.azurerm_client_config.current: Read complete after 0s [id=Y2xpZW50Q29uZmlncy9jbGllbnRJZD1lNWRmNjg0My1lYmRlLTRkNzktOWM3ZS03NDMxYTNjZDQzZDI7b2JqZWN0SWQ9OTczZGYyYWQtNGU1ZS00ZThiLTlkZjYtMTdmNjFlOWVmZDU1O3N1YnNjcmlwdGlvbklkPTFmZGFiMTE4LTE2MzgtNDE5YS04YjEyLTA2Yzk1NDM3MTRhMDt0ZW5hbnRJZD0zNzk2M2RkNC1mNGU2LTQwZjgtYTdkNi0yNGI5NzkxOWU0NTI=]�[0m
�[0m�[1mdata.azurerm_client_config.current: Read complete after 0s [id=Y2xpZW50Q29uZmlncy9jbGllbnRJZD1lNWRmNjg0My1lYmRlLTRkNzktOWM3ZS03NDMxYTNjZDQzZDI7b2JqZWN0SWQ9OTczZGYyYWQtNGU1ZS00ZThiLTlkZjYtMTdmNjFlOWVmZDU1O3N1YnNjcmlwdGlvbklkPTFmZGFiMTE4LTE2MzgtNDE5YS04YjEyLTA2Yzk1NDM3MTRhMDt0ZW5hbnRJZD0zNzk2M2RkNC1mNGU2LTQwZjgtYTdkNi0yNGI5NzkxOWU0NTI=]�[0m
�[0m�[1mdata.azurerm_virtual_network.virtual_network: Read complete after 0s [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/ptt-dev-networking-rg/providers/Microsoft.Network/virtualNetworks/spoke-ptt-dev-vnet001]�[0m
�[0m�[1mazurerm_monitor_action_group.monitor_action_group: Refreshing state... [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/secfunc-dev-logging-rg/providers/Microsoft.Insights/actionGroups/secfunc-dev-ag001]�[0m
�[0m�[1mmodule.application_insights.azurerm_application_insights.application_insights: Refreshing state... [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/secfunc-dev-logging-rg/providers/Microsoft.Insights/components/secfunc-dev-appi001]�[0m
�[0m�[1mdata.azurerm_route_table.route_table: Read complete after 1s [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/ptt-dev-networking-rg/providers/Microsoft.Network/routeTables/ptt-dev-default-rt001]�[0m
�[0m�[1mdata.azurerm_subscription.current: Read complete after 1s [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0]�[0m
�[0m�[1mmodule.app_service_plan.azurerm_service_plan.service_plan: Refreshing state... [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/secfunc-dev-app-rg/providers/Microsoft.Web/serverFarms/secfunc-dev-asp001]�[0m
�[0m�[1mmodule.key_vault.azurerm_key_vault.key_vault: Refreshing state... [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/secfunc-dev-app-rg/providers/Microsoft.KeyVault/vaults/secfunc-dev-kv001]�[0m
�[0m�[1mmodule.storage_account.azurerm_storage_account.storage_account: Refreshing state... [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/secfunc-dev-app-rg/providers/Microsoft.Storage/storageAccounts/secfuncdevstg001]�[0m
�[0m�[1mdata.azurerm_network_security_group.network_security_group: Read complete after 1s [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/ptt-dev-networking-rg/providers/Microsoft.Network/networkSecurityGroups/ptt-dev-default-nsg001]�[0m
�[0m�[1mazapi_resource.subnet_function: Refreshing state... [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/ptt-dev-networking-rg/providers/Microsoft.Network/virtualNetworks/spoke-ptt-dev-vnet001/subnets/FunctionSubnet]�[0m
�[0m�[1mdata.azurerm_location.current: Read complete after 1s [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/locations/northeurope]�[0m
�[0m�[1mazurerm_monitor_activity_log_alert.monitor_activity_log_alert_service_health: Refreshing state... [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/secfunc-dev-logging-rg/providers/Microsoft.Insights/activityLogAlerts/secfunc-dev-alert-servicehealth]�[0m
�[0m�[1mmodule.app_service_plan.data.azurerm_monitor_diagnostic_categories.diagnostic_categories_service_plan: Reading...�[0m�[0m
�[0m�[1mmodule.app_service_plan.data.azurerm_monitor_diagnostic_categories.diagnostic_categories_service_plan: Read complete after 1s [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/secfunc-dev-app-rg/providers/Microsoft.Web/serverFarms/secfunc-dev-asp001]�[0m
�[0m�[1mmodule.app_service_plan.azurerm_monitor_diagnostic_setting.diagnostic_setting_service_plan["0"]: Refreshing state... [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/secfunc-dev-app-rg/providers/Microsoft.Web/serverFarms/secfunc-dev-asp001|applicationLogs-0]�[0m
�[0m�[1mmodule.application_insights.data.azurerm_monitor_diagnostic_categories.diagnostic_categories_application_insights: Reading...�[0m�[0m
�[0m�[1mmodule.application_insights.data.azurerm_monitor_diagnostic_categories.diagnostic_categories_application_insights: Read complete after 1s [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/secfunc-dev-logging-rg/providers/Microsoft.Insights/components/secfunc-dev-appi001]�[0m
�[0m�[1mazapi_resource.subnet_private_endpoints: Refreshing state... [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/ptt-dev-networking-rg/providers/Microsoft.Network/virtualNetworks/spoke-ptt-dev-vnet001/subnets/PeSubnet]�[0m
�[0m�[1mmodule.key_vault.data.azurerm_monitor_diagnostic_categories.diagnostic_categories_key_vault: Reading...�[0m�[0m
�[0m�[1mmodule.key_vault.azurerm_role_assignment.current_roleassignment_key_vault: Refreshing state... [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/secfunc-dev-app-rg/providers/Microsoft.KeyVault/vaults/secfunc-dev-kv001/providers/Microsoft.Authorization/roleAssignments/8523f257-0bb0-0bfe-e969-5aad985d144f]�[0m
�[0m�[1mmodule.key_vault.azurerm_private_endpoint.private_endpoint_cognitive_account_vault: Refreshing state... [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/secfunc-dev-app-rg/providers/Microsoft.Network/privateEndpoints/secfunc-dev-kv001-vault-pe]�[0m
�[0m�[1mmodule.key_vault.data.azurerm_monitor_diagnostic_categories.diagnostic_categories_key_vault: Read complete after 1s [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/secfunc-dev-app-rg/providers/Microsoft.KeyVault/vaults/secfunc-dev-kv001]�[0m
�[0m�[1mmodule.key_vault.azurerm_monitor_diagnostic_setting.diagnostic_setting_key_vault["0"]: Refreshing state... [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/secfunc-dev-app-rg/providers/Microsoft.KeyVault/vaults/secfunc-dev-kv001|applicationLogs-0]�[0m
�[0m�[1mmodule.storage_account.azurerm_private_endpoint.private_endpoint_storage_account["table"]: Refreshing state... [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/secfunc-dev-app-rg/providers/Microsoft.Network/privateEndpoints/secfuncdevstg001-table-pe]�[0m
�[0m�[1mmodule.storage_account.azurerm_private_endpoint.private_endpoint_storage_account["queue"]: Refreshing state... [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/secfunc-dev-app-rg/providers/Microsoft.Network/privateEndpoints/secfuncdevstg001-queue-pe]�[0m
�[0m�[1mmodule.storage_account.azurerm_role_assignment.current_roleassignment_storage_blob_data_owner: Refreshing state... [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/secfunc-dev-app-rg/providers/Microsoft.Storage/storageAccounts/secfuncdevstg001/providers/Microsoft.Authorization/roleAssignments/41f8662d-acd6-7e98-b3e6-fe5bfca5f0fa]�[0m
�[0m�[1mmodule.storage_account.data.azurerm_monitor_diagnostic_categories.diagnostic_categories_storage_account: Reading...�[0m�[0m
�[0m�[1mmodule.storage_account.azurerm_private_endpoint.private_endpoint_storage_account["blob"]: Refreshing state... [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/secfunc-dev-app-rg/providers/Microsoft.Network/privateEndpoints/secfuncdevstg001-blob-pe]�[0m
�[0m�[1mmodule.storage_account.azurerm_private_endpoint.private_endpoint_storage_account["file"]: Refreshing state... [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/secfunc-dev-app-rg/providers/Microsoft.Network/privateEndpoints/secfuncdevstg001-file-pe]�[0m
�[0m�[1mmodule.storage_account.data.azurerm_monitor_diagnostic_categories.diagnostic_categories_storage_account: Read complete after 1s [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/secfunc-dev-app-rg/providers/Microsoft.Storage/storageAccounts/secfuncdevstg001]�[0m
�[0m�[1mmodule.storage_account.azurerm_monitor_diagnostic_setting.diagnostic_setting_storage_account["0"]: Refreshing state... [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/secfunc-dev-app-rg/providers/Microsoft.Storage/storageAccounts/secfuncdevstg001|applicationLogs-0]�[0m
�[0m�[1mmodule.key_vault.time_sleep.sleep_connectivity: Refreshing state... [id=2024-11-04T08:27:54Z]�[0m
�[0m�[1mazurerm_key_vault_secret.key_vault_secret_sample: Refreshing state... [id=https://secfunc-dev-kv001.vault.azure.net/secrets/MySampleSecret/94453490860b4da9bd78aff14dfa26d8]�[0m
�[0m�[1mmodule.storage_account.time_sleep.sleep_connectivity: Refreshing state... [id=2024-11-04T08:28:57Z]�[0m
�[0m�[1mazapi_resource.function: Refreshing state... [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/secfunc-dev-app-rg/providers/Microsoft.Web/sites/secfunc-dev-fctn001]�[0m
�[0m�[1mazurerm_role_assignment.function_role_assignment_storage_blob_data_owner: Refreshing state... [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/secfunc-dev-app-rg/providers/Microsoft.Storage/storageAccounts/secfuncdevstg001/providers/Microsoft.Authorization/roleAssignments/e9386099-5c1f-22ce-771b-f5f88cfde5f9]�[0m
�[0m�[1mazurerm_role_assignment.function_role_assignment_key_vault: Refreshing state... [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/secfunc-dev-app-rg/providers/Microsoft.KeyVault/vaults/secfunc-dev-kv001/providers/Microsoft.Authorization/roleAssignments/7d68accc-ed70-8229-afc4-f8ae5f84734a]�[0m
�[0m�[1mazurerm_private_endpoint.function_private_endpoint: Refreshing state... [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/secfunc-dev-app-rg/providers/Microsoft.Network/privateEndpoints/secfunc-dev-fctn001-pe]�[0m
�[0m�[1mazurerm_monitor_diagnostic_setting.diagnostic_setting_function: Refreshing state... [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/secfunc-dev-app-rg/providers/Microsoft.Web/sites/secfunc-dev-fctn001|logAnalytics]�[0m

Terraform used the selected providers to generate the following execution
plan. Resource actions are indicated with the following symbols:
  �[33m~�[0m update in-place�[0m
 �[36m<=�[0m read (data resources)�[0m

Terraform will perform the following actions:

�[1m  # data.azurerm_monitor_diagnostic_categories.diagnostic_categories_function�[0m will be read during apply
  # (depends on a resource or a module with changes pending)
�[0m �[36m<=�[0m�[0m data "azurerm_monitor_diagnostic_categories" "diagnostic_categories_function" {
      �[32m+�[0m�[0m id                  = (known after apply)
      �[32m+�[0m�[0m log_category_groups = (known after apply)
      �[32m+�[0m�[0m log_category_types  = (known after apply)
      �[32m+�[0m�[0m metrics             = (known after apply)
      �[32m+�[0m�[0m resource_id         = "/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/secfunc-dev-app-rg/providers/Microsoft.Web/sites/secfunc-dev-fctn001"
    }

�[1m  # azapi_resource.function�[0m will be updated in-place
�[0m  �[33m~�[0m�[0m resource "azapi_resource" "function" {
      �[33m~�[0m�[0m body                      = {
          �[33m~�[0m�[0m properties = {
              �[33m~�[0m�[0m scmSiteAlsoStopped        = false �[33m->�[0m�[0m true
              �[33m~�[0m�[0m serverFarmId              = "/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/secfunc-dev-app-rg/providers/Microsoft.Web/serverfarms/secfunc-dev-asp001" �[33m->�[0m�[0m "/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/secfunc-dev-app-rg/providers/Microsoft.Web/serverFarms/secfunc-dev-asp001"
                �[90m# (18 unchanged attributes hidden)�[0m�[0m
            }
            �[90m# (1 unchanged attribute hidden)�[0m�[0m
        }
        id                        = "/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/secfunc-dev-app-rg/providers/Microsoft.Web/sites/secfunc-dev-fctn001"
        name                      = "secfunc-dev-fctn001"
      �[33m~�[0m�[0m output                    = {
          �[31m-�[0m�[0m id         = "/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/secfunc-dev-app-rg/providers/Microsoft.Web/sites/secfunc-dev-fctn001"
          �[31m-�[0m�[0m identity   = {
              �[31m-�[0m�[0m principalId = "d7279f79-2f40-4e6f-a7e1-12a8462612a6"
              �[31m-�[0m�[0m tenantId    = "37963dd4-f4e6-40f8-a7d6-24b97919e452"
            }
          �[31m-�[0m�[0m properties = {
              �[31m-�[0m�[0m availabilityState           = "Normal"
              �[31m-�[0m�[0m defaultHostName             = "secfunc-dev-fctn001.azurewebsites.net"
              �[31m-�[0m�[0m enabledHostNames            = [
                  �[31m-�[0m�[0m "secfunc-dev-fctn001.azurewebsites.net",
                  �[31m-�[0m�[0m "secfunc-dev-fctn001.scm.azurewebsites.net",
                ]
              �[31m-�[0m�[0m hostNameSslStates           = [
                  �[31m-�[0m�[0m {},
                  �[31m-�[0m�[0m {},
                ]
              �[31m-�[0m�[0m hostNames                   = [
                  �[31m-�[0m�[0m "secfunc-dev-fctn001.azurewebsites.net",
                ]
              �[31m-�[0m�[0m lastModifiedTimeUtc         = "2024-11-04T08:31:20.4833333"
              �[31m-�[0m�[0m outboundIpAddresses         = "4.209.153.190,4.209.153.232,4.209.154.46,4.209.155.136,4.209.155.234,4.209.156.26,20.107.224.63"
              �[31m-�[0m�[0m possibleOutboundIpAddresses = "4.209.157.121,4.209.157.131,4.209.157.167,4.209.157.170,4.209.157.197,4.209.157.208,68.219.42.210,4.209.152.77,4.209.152.144,4.209.153.100,4.209.153.144,4.209.153.158,4.209.153.190,4.209.153.232,4.209.154.46,4.209.155.136,4.209.155.234,4.209.156.26,4.209.156.39,4.209.156.150,4.209.157.75,4.209.157.76,4.209.157.100,4.209.157.113,4.209.157.220,68.219.42.234,68.219.42.247,68.219.43.144,68.219.43.176,68.219.43.204,20.107.224.63"
              �[31m-�[0m�[0m repositorySiteName          = "secfunc-dev-fctn001"
              �[31m-�[0m�[0m resourceGroup               = "secfunc-dev-app-rg"
              �[31m-�[0m�[0m state                       = "Running"
              �[31m-�[0m�[0m usageState                  = "Normal"
            }
          �[31m-�[0m�[0m type       = "Microsoft.Web/sites"
        } -> (known after apply)
        tags                      = {}
        �[90m# (6 unchanged attributes hidden)�[0m�[0m

        �[90m# (1 unchanged block hidden)�[0m�[0m
    }

�[1m  # azurerm_monitor_diagnostic_setting.diagnostic_setting_function�[0m will be updated in-place
�[0m  �[33m~�[0m�[0m resource "azurerm_monitor_diagnostic_setting" "diagnostic_setting_function" {
        id                             = "/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/secfunc-dev-app-rg/providers/Microsoft.Web/sites/secfunc-dev-fctn001|logAnalytics"
        name                           = "logAnalytics"
        �[90m# (5 unchanged attributes hidden)�[0m�[0m

      �[33m~�[0m�[0m enabled_log (known after apply)
      �[31m-�[0m�[0m enabled_log {
          �[31m-�[0m�[0m category_group = "allLogs" �[90m-> null�[0m�[0m
            �[90m# (1 unchanged attribute hidden)�[0m�[0m

          �[31m-�[0m�[0m retention_policy {
              �[31m-�[0m�[0m days    = 0 �[90m-> null�[0m�[0m
              �[31m-�[0m�[0m enabled = false �[90m-> null�[0m�[0m
            }
        }
      �[31m-�[0m�[0m enabled_log {
          �[31m-�[0m�[0m category_group = "audit" �[90m-> null�[0m�[0m
            �[90m# (1 unchanged attribute hidden)�[0m�[0m

          �[31m-�[0m�[0m retention_policy {
              �[31m-�[0m�[0m days    = 0 �[90m-> null�[0m�[0m
              �[31m-�[0m�[0m enabled = false �[90m-> null�[0m�[0m
            }
        }

      �[33m~�[0m�[0m metric (known after apply)
      �[31m-�[0m�[0m metric {
          �[31m-�[0m�[0m category = "AllMetrics" �[90m-> null�[0m�[0m
          �[31m-�[0m�[0m enabled  = true �[90m-> null�[0m�[0m

          �[31m-�[0m�[0m retention_policy {
              �[31m-�[0m�[0m days    = 0 �[90m-> null�[0m�[0m
              �[31m-�[0m�[0m enabled = false �[90m-> null�[0m�[0m
            }
        }
    }

�[1mPlan:�[0m 0 to add, 2 to change, 0 to destroy.
�[0m�[90m
─────────────────────────────────────────────────────────────────────────────�[0m

Note: You didn't use the -out option to save this plan, so Terraform can't
guarantee to take exactly these actions if you run "terraform apply" now.
Releasing state lock. This may take a few moments...

Copy link
Contributor Author

@marvinbuss marvinbuss left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM!

@marvinbuss marvinbuss merged commit bbb8c73 into main Nov 4, 2024
7 checks passed
@marvinbuss marvinbuss deleted the marvinbuss/provider_upgrades branch November 4, 2024 08:47
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant