Created
January 15, 2020 17:39
-
-
Save grahamhayes/b83d8efcdffdedb349f83ec48de0534f to your computer and use it in GitHub Desktop.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# module.aks_simple_eu_3.module.aks_base.azurerm_kubernetes_cluster.k8_cluster must be replaced | |
-/+ resource "azurerm_kubernetes_cluster" "k8_cluster" { | |
- api_server_authorized_ip_ranges = [] -> null | |
dns_prefix = "prod-c12-eu-3" | |
enable_pod_security_policy = true | |
~ fqdn = "prod-c12-eu-3-b8f2d244.hcp.northeurope.azmk8s.io" -> (known after apply) | |
~ id = "<snip>resourcegroups/prod-c12-eu-3-rg/providers/Microsoft.ContainerService/managedClusters/prod-c12-eu-3" -> (known after apply) | |
~ kube_admin_config = [ | |
- { | |
<snip> | |
}, | |
] -> (known after apply) | |
~ kube_admin_config_raw = (sensitive value) | |
~ kube_config = [ | |
- { | |
<snip> | |
}, | |
] -> (known after apply) | |
~ kube_config_raw = (sensitive value) | |
kubernetes_version = "1.17.0" | |
location = "northeurope" | |
name = "prod-c12-eu-3" | |
~ node_resource_group = "MC_prod-c12-eu-3-rg_prod-c12-eu-3_northeurope" -> (known after apply) | |
+ private_fqdn = (known after apply) | |
- private_link_enabled = false -> null | |
resource_group_name = "prod-c12-eu-3-rg" | |
tags = { | |
"dept" = "engineering" | |
"environment" = "c12" | |
"source" = "terraform" | |
"team" = "c12" | |
"workspace" = "prod" | |
} | |
addon_profile { | |
azure_policy { | |
enabled = true | |
} | |
kube_dashboard { | |
enabled = true | |
} | |
oms_agent { | |
enabled = true | |
log_analytics_workspace_id = "<snip>resourcegroups/prod-c12-shared-resources-rg/providers/microsoft.operationalinsights/workspaces/prod-c12-workspace" | |
} | |
} | |
~ agent_pool_profile { | |
~ availability_zones = [ | |
+ "1", | |
+ "2", | |
+ "3", | |
] | |
count = 3 | |
+ dns_prefix = (known after apply) | |
~ enable_auto_scaling = false -> true | |
- enable_node_public_ip = false -> null | |
~ fqdn = "prod-c12-eu-3-b8f2d244.hcp.northeurope.azmk8s.io" -> (known after apply) | |
~ max_count = 0 -> 12 | |
max_pods = 110 | |
~ min_count = 0 -> 3 | |
~ name = "prodc12eu3lg" -> "prodc12eul0" # forces replacement | |
- node_taints = [] -> null | |
os_disk_size_gb = 30 | |
os_type = "Linux" | |
type = "VirtualMachineScaleSets" | |
~ vm_size = "Standard_NC6_Promo" -> "Standard_DS2_v2" # forces replacement | |
vnet_subnet_id = "<snip>resourceGroups/prod-c12-eu-3-rg/providers/Microsoft.Network/virtualNetworks/prod-c12-eu-3/subnets/prod-c12-eu-3" | |
} | |
~ agent_pool_profile { | |
availability_zones = [ | |
"1", | |
"2", | |
"3", | |
] | |
count = 3 | |
+ dns_prefix = (known after apply) | |
enable_auto_scaling = true | |
- enable_node_public_ip = false -> null | |
~ fqdn = "prod-c12-eu-3-b8f2d244.hcp.northeurope.azmk8s.io" -> (known after apply) | |
max_count = 12 | |
max_pods = 110 | |
min_count = 3 | |
~ name = "prodc12eul0" -> "prodc12eul1" # forces replacement | |
- node_taints = [] -> null | |
os_disk_size_gb = 30 | |
os_type = "Linux" | |
type = "VirtualMachineScaleSets" | |
vm_size = "Standard_DS2_v2" | |
vnet_subnet_id = "<snip>resourceGroups/prod-c12-eu-3-rg/providers/Microsoft.Network/virtualNetworks/prod-c12-eu-3/subnets/prod-c12-eu-3" | |
} | |
~ agent_pool_profile { | |
availability_zones = [ | |
"1", | |
"2", | |
"3", | |
] | |
count = 3 | |
+ dns_prefix = (known after apply) | |
enable_auto_scaling = true | |
- enable_node_public_ip = false -> null | |
~ fqdn = "prod-c12-eu-3-b8f2d244.hcp.northeurope.azmk8s.io" -> (known after apply) | |
max_count = 12 | |
max_pods = 110 | |
min_count = 3 | |
~ name = "prodc12eul1" -> "prodcw" # forces replacement | |
- node_taints = [] -> null | |
os_disk_size_gb = 30 | |
~ os_type = "Linux" -> "Windows" # forces replacement | |
type = "VirtualMachineScaleSets" | |
vm_size = "Standard_DS2_v2" | |
vnet_subnet_id = "<snip>resourceGroups/prod-c12-eu-3-rg/providers/Microsoft.Network/virtualNetworks/prod-c12-eu-3/subnets/prod-c12-eu-3" | |
} | |
~ agent_pool_profile { | |
- availability_zones = [ | |
- "1", | |
- "2", | |
- "3", | |
] -> null | |
count = 3 | |
+ dns_prefix = (known after apply) | |
- enable_auto_scaling = true -> null | |
- enable_node_public_ip = false -> null | |
~ fqdn = "prod-c12-eu-3-b8f2d244.hcp.northeurope.azmk8s.io" -> (known after apply) | |
- max_count = 12 -> null | |
max_pods = 110 | |
- min_count = 3 -> null | |
~ name = "prodcw" -> "prodc12eu3lg" # forces replacement | |
- node_taints = [] -> null | |
os_disk_size_gb = 30 | |
~ os_type = "Windows" -> "Linux" # forces replacement | |
type = "VirtualMachineScaleSets" | |
~ vm_size = "Standard_DS2_v2" -> "Standard_NC6_Promo" # forces replacement | |
vnet_subnet_id = "<snip>resourceGroups/prod-c12-eu-3-rg/providers/Microsoft.Network/virtualNetworks/prod-c12-eu-3/subnets/prod-c12-eu-3" | |
} | |
- default_node_pool { | |
- availability_zones = [] -> null | |
- enable_auto_scaling = false -> null | |
- enable_node_public_ip = false -> null | |
- max_count = 0 -> null | |
- max_pods = 110 -> null | |
- min_count = 0 -> null | |
- name = "prodc12eu3lg" -> null # forces replacement | |
- node_count = 3 -> null | |
- node_taints = [] -> null | |
- os_disk_size_gb = 30 -> null | |
- type = "VirtualMachineScaleSets" -> null | |
- vm_size = "Standard_NC6_Promo" -> null # forces replacement | |
- vnet_subnet_id = "<snip>resourceGroups/prod-c12-eu-3-rg/providers/Microsoft.Network/virtualNetworks/prod-c12-eu-3/subnets/prod-c12-eu-3" -> null # forces replacement | |
} | |
linux_profile { | |
admin_username = "systemadmin" | |
ssh_key { | |
<snip> | |
} | |
} | |
~ network_profile { | |
dns_service_ip = "10.12.128.10" | |
docker_bridge_cidr = "172.17.0.1/16" | |
~ load_balancer_sku = "Standard" -> "standard" | |
network_plugin = "azure" | |
network_policy = "azure" | |
+ pod_cidr = (known after apply) | |
service_cidr = "10.12.128.0/18" | |
} | |
role_based_access_control { | |
enabled = true | |
azure_active_directory { | |
<snip> | |
} | |
} | |
service_principal { | |
client_id = "<snip>" | |
client_secret = (sensitive value) | |
} | |
windows_profile { | |
admin_password = (sensitive value) | |
admin_username = "systemadmin" | |
} | |
} | |
5:33 | |
Is a snippet from my terraform plan - it looks like the order of the old nodepools is not respected, and the provider is mapping the AKS responses to the new resource type |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment