Created
December 10, 2020 06:35
-
-
Save PradeepLoganathan/aa1c57a8d0fbbc7865a545773a28a4b8 to your computer and use it in GitHub Desktop.
Terraform plan output for creating a AKS Kubernetes cluster.
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
An execution plan has been generated and is shown below. | |
Resource actions are indicated with the following symbols: | |
+ create | |
-/+ destroy and then create replacement | |
Terraform will perform the following actions: | |
# azurerm_kubernetes_cluster.aks_cluster will be created | |
+ resource "azurerm_kubernetes_cluster" "aks_cluster" { | |
+ dns_prefix = "K8s-akscluster" | |
+ fqdn = (known after apply) | |
+ id = (known after apply) | |
+ kube_admin_config = (known after apply) | |
+ kube_admin_config_raw = (sensitive value) | |
+ kube_config = (known after apply) | |
+ kube_config_raw = (sensitive value) | |
+ kubelet_identity = (known after apply) | |
+ kubernetes_version = "1.16.8" | |
+ location = "australiaeast" | |
+ name = "K8s-cluster" | |
+ node_resource_group = "K8s-worker" | |
+ private_cluster_enabled = false | |
+ private_fqdn = (known after apply) | |
+ private_link_enabled = (known after apply) | |
+ resource_group_name = "K8s-rg" | |
+ sku_tier = "Free" | |
+ addon_profile { | |
+ azure_policy { | |
+ enabled = true | |
} | |
+ kube_dashboard { | |
+ enabled = true | |
} | |
+ oms_agent { | |
+ enabled = true | |
+ log_analytics_workspace_id = (known after apply) | |
+ oms_agent_identity = (known after apply) | |
} | |
} | |
+ auto_scaler_profile { | |
+ balance_similar_node_groups = (known after apply) | |
+ max_graceful_termination_sec = (known after apply) | |
+ scale_down_delay_after_add = (known after apply) | |
+ scale_down_delay_after_delete = (known after apply) | |
+ scale_down_delay_after_failure = (known after apply) | |
+ scale_down_unneeded = (known after apply) | |
+ scale_down_unready = (known after apply) | |
+ scale_down_utilization_threshold = (known after apply) | |
+ scan_interval = (known after apply) | |
} | |
+ default_node_pool { | |
+ availability_zones = [ | |
+ "1", | |
+ "2", | |
] | |
+ enable_auto_scaling = true | |
+ enable_node_public_ip = false | |
+ max_count = 5 | |
+ max_pods = 250 | |
+ min_count = 3 | |
+ name = "systempool" | |
+ node_count = 2 | |
+ node_taints = [ | |
+ "CriticalAddonsOnly=true:NoSchedule", | |
] | |
+ orchestrator_version = "1.16.8" | |
+ os_disk_size_gb = 128 | |
+ type = "VirtualMachineScaleSets" | |
+ vm_size = "Standard_D2s_v3" | |
+ vnet_subnet_id = (known after apply) | |
} | |
+ identity { | |
+ principal_id = (known after apply) | |
+ tenant_id = (known after apply) | |
+ type = "SystemAssigned" | |
} | |
+ network_profile { | |
+ dns_service_ip = "100.64.0.10" | |
+ docker_bridge_cidr = "100.65.0.1/16" | |
+ load_balancer_sku = "standard" | |
+ network_plugin = "azure" | |
+ network_policy = "azure" | |
+ outbound_type = "userDefinedRouting" | |
+ pod_cidr = (known after apply) | |
+ service_cidr = "100.64.0.0/16" | |
+ load_balancer_profile { | |
+ effective_outbound_ips = (known after apply) | |
+ idle_timeout_in_minutes = (known after apply) | |
+ managed_outbound_ip_count = (known after apply) | |
+ outbound_ip_address_ids = (known after apply) | |
+ outbound_ip_prefix_ids = (known after apply) | |
+ outbound_ports_allocated = (known after apply) | |
} | |
} | |
+ role_based_access_control { | |
+ enabled = true | |
+ azure_active_directory { | |
+ managed = true | |
+ tenant_id = (known after apply) | |
} | |
} | |
+ windows_profile { | |
+ admin_password = (sensitive value) | |
+ admin_username = (known after apply) | |
} | |
} | |
# azurerm_kubernetes_cluster_node_pool.aks_cluster_user_pool["pool2"] will be created | |
+ resource "azurerm_kubernetes_cluster_node_pool" "aks_cluster_user_pool" { | |
+ availability_zones = [ | |
+ "1", | |
+ "2", | |
] | |
+ enable_auto_scaling = false | |
+ id = (known after apply) | |
+ kubernetes_cluster_id = (known after apply) | |
+ max_pods = 30 | |
+ mode = "User" | |
+ name = "pool2" | |
+ node_count = 1 | |
+ node_taints = [ | |
+ "kubernetes.io/os=windows:NoSchedule", | |
] | |
+ orchestrator_version = "1.16.8" | |
+ os_disk_size_gb = (known after apply) | |
+ os_type = "Windows" | |
+ priority = "Regular" | |
+ spot_max_price = -1 | |
+ vm_size = "Standard_D4_v3" | |
} | |
# azurerm_kubernetes_cluster_node_pool.aks_cluster_user_pool["pool3"] will be created | |
+ resource "azurerm_kubernetes_cluster_node_pool" "aks_cluster_user_pool" { | |
+ availability_zones = [ | |
+ "1", | |
+ "2", | |
+ "3", | |
] | |
+ enable_auto_scaling = true | |
+ id = (known after apply) | |
+ kubernetes_cluster_id = (known after apply) | |
+ max_count = 12 | |
+ max_pods = 30 | |
+ min_count = 4 | |
+ mode = "User" | |
+ name = "pool3" | |
+ node_count = 4 | |
+ orchestrator_version = "1.16.8" | |
+ os_disk_size_gb = (known after apply) | |
+ os_type = "Linux" | |
+ priority = "Regular" | |
+ spot_max_price = -1 | |
+ vm_size = "Standard_E4_v3" | |
} | |
# azurerm_log_analytics_solution.clusterinsightssolution will be created | |
+ resource "azurerm_log_analytics_solution" "clusterinsightssolution" { | |
+ id = (known after apply) | |
+ location = "australiaeast" | |
+ resource_group_name = "K8s-rg" | |
+ solution_name = "ContainerInsights" | |
+ workspace_name = (known after apply) | |
+ workspace_resource_id = (known after apply) | |
+ plan { | |
+ name = (known after apply) | |
+ product = "OMSGallery/ContainerInsights" | |
+ publisher = "Microsoft" | |
} | |
} | |
# azurerm_log_analytics_workspace.clusterinsightsworkspace will be created | |
+ resource "azurerm_log_analytics_workspace" "clusterinsightsworkspace" { | |
+ daily_quota_gb = -1 | |
+ id = (known after apply) | |
+ location = "australiaeast" | |
+ name = (known after apply) | |
+ portal_url = (known after apply) | |
+ primary_shared_key = (sensitive value) | |
+ resource_group_name = "K8s-rg" | |
+ retention_in_days = 30 | |
+ secondary_shared_key = (sensitive value) | |
+ sku = "PerGB2018" | |
+ workspace_id = (known after apply) | |
} | |
# azurerm_resource_group.aks_res_grp must be replaced | |
-/+ resource "azurerm_resource_group" "aks_res_grp" { | |
~ id = "/subscriptions/2633e717-5585-4ade-98a1-bd01d68ec151/resourceGroups/test-rg" -> (known after apply) | |
location = "australiaeast" | |
~ name = "test-rg" -> "K8s-rg" # forces replacement | |
- tags = {} -> null | |
} | |
# azurerm_route_table.aks_route_table will be created | |
+ resource "azurerm_route_table" "aks_route_table" { | |
+ disable_bgp_route_propagation = false | |
+ id = (known after apply) | |
+ location = "australiaeast" | |
+ name = "K8s-rg-routetable" | |
+ resource_group_name = "K8s-rg" | |
+ route = [ | |
+ { | |
+ address_prefix = "10.100.0.0/14" | |
+ name = "cluster-01" | |
+ next_hop_in_ip_address = "10.10.1.1" | |
+ next_hop_type = "VirtualAppliance" | |
}, | |
] | |
+ subnets = (known after apply) | |
} | |
# azurerm_subnet.aks_subnet must be replaced | |
-/+ resource "azurerm_subnet" "aks_subnet" { | |
~ address_prefix = "10.1.0.0/24" -> (known after apply) | |
address_prefixes = [ | |
"10.1.0.0/24", | |
] | |
enforce_private_link_endpoint_network_policies = false | |
enforce_private_link_service_network_policies = false | |
~ id = "/subscriptions/2633e717-5585-4ade-98a1-bd01d68ec151/resourceGroups/test-rg/providers/Microsoft.Network/virtualNetworks/test-vnet/subnets/test-subnet" -> (known after apply) | |
~ name = "test-subnet" -> "K8s-subnet" # forces replacement | |
~ resource_group_name = "test-rg" -> "K8s-rg" # forces replacement | |
- service_endpoints = [] -> null | |
~ virtual_network_name = "test-vnet" -> "K8s-vnet" # forces replacement | |
} | |
# azurerm_subnet_route_table_association.cluster-01 will be created | |
+ resource "azurerm_subnet_route_table_association" "cluster-01" { | |
+ id = (known after apply) | |
+ route_table_id = (known after apply) | |
+ subnet_id = (known after apply) | |
} | |
# azurerm_virtual_network.aks_vnet must be replaced | |
-/+ resource "azurerm_virtual_network" "aks_vnet" { | |
address_space = [ | |
"10.1.0.0/16", | |
] | |
- dns_servers = [] -> null | |
~ guid = "ee9cecd0-c18b-4cc2-a296-9789aff6ace8" -> (known after apply) | |
~ id = "/subscriptions/2633e717-5585-4ade-98a1-bd01d68ec151/resourceGroups/test-rg/providers/Microsoft.Network/virtualNetworks/test-vnet" -> (known after apply) | |
location = "australiaeast" | |
~ name = "test-vnet" -> "K8s-vnet" # forces replacement | |
~ resource_group_name = "test-rg" -> "K8s-rg" # forces replacement | |
~ subnet = [ | |
- { | |
- address_prefix = "10.1.0.0/24" | |
- id = "/subscriptions/2633e717-5585-4ade-98a1-bd01d68ec151/resourceGroups/test-rg/providers/Microsoft.Network/virtualNetworks/test-vnet/subnets/test-subnet" | |
- name = "test-subnet" | |
- security_group = "" | |
}, | |
] -> (known after apply) | |
- tags = {} -> null | |
} | |
# random_id.log_analytics_workspace_name_suffix will be created | |
+ resource "random_id" "log_analytics_workspace_name_suffix" { | |
+ b64_std = (known after apply) | |
+ b64_url = (known after apply) | |
+ byte_length = 8 | |
+ dec = (known after apply) | |
+ hex = (known after apply) | |
+ id = (known after apply) | |
} | |
Plan: 11 to add, 0 to change, 3 to destroy. | |
------------------------------------------------------------------------ |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment