Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Update source tag in the provider {} block #27

Merged
merged 1 commit into from
Nov 7, 2023

Conversation

kunduso
Copy link
Owner

@kunduso kunduso commented Nov 7, 2023

No description provided.

@kunduso kunduso self-assigned this Nov 7, 2023
Copy link
Contributor

github-actions bot commented Nov 7, 2023

Infracost report

💰 Monthly cost will decrease by $62 📉

Project Cost change New monthly cost
kunduso/amazon-elasticache-redis-tf/TFplan.JSON -$62 (-22%) $226
Cost details
──────────────────────────────────
Project: kunduso/amazon-elasticache-redis-tf/TFplan.JSON

- aws_instance.app-server-read
  -$31

    - Instance usage (Linux/UNIX, on-demand, t3.medium)
      -$30

    - CPU credits
      $0.00

    - root_block_device
    
        - Storage (general purpose SSD, gp2)
          -$0.80

- aws_instance.app-server-write
  -$31

    - Instance usage (Linux/UNIX, on-demand, t3.medium)
      -$30

    - CPU credits
      $0.00

    - root_block_device
    
        - Storage (general purpose SSD, gp2)
          -$0.80

Monthly cost change for kunduso/amazon-elasticache-redis-tf/TFplan.JSON
Amount:  -$62 ($288 → $226)
Percent: -22%

──────────────────────────────────
Key: ~ changed, + added, - removed

25 cloud resources were detected:
∙ 4 were estimated, 2 of which include usage-based costs, see https://infracost.io/usage-file
∙ 21 were free:
  ∙ 4 x aws_route_table
  ∙ 4 x aws_route_table_association
  ∙ 4 x aws_subnet
  ∙ 2 x aws_iam_policy
  ∙ 2 x aws_ssm_parameter
  ∙ 1 x aws_default_security_group
  ∙ 1 x aws_elasticache_subnet_group
  ∙ 1 x aws_secretsmanager_secret_version
  ∙ 1 x aws_security_group
  ∙ 1 x aws_vpc

Infracost estimate: Monthly cost will decrease by $62 ↓
┏━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━┳━━━━━━━━━━━━━┳━━━━━━━━━━━━━━━━━━┓
┃ Project                                            ┃ Cost change ┃ New monthly cost ┃
┣━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━╋━━━━━━━━━━━━━╋━━━━━━━━━━━━━━━━━━┫
┃ kunduso/amazon-elasticache-redis-tf/TFplan.JSON    ┃ -$62 (-22%) ┃ $226             ┃
┗━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━┻━━━━━━━━━━━━━┻━━━━━━━━━━━━━━━━━━┛
This comment will be updated when code changes.

Copy link
Contributor

github-actions bot commented Nov 7, 2023

Terraform Format and Style 🖌success

Terraform Initialization ⚙️success

Terraform Plan 📖success

Terraform Validation 🤖success

Show Plan

terraform
random_password.auth: Refreshing state... [id=none]
aws_iam_instance_profile.ec2_profile: Refreshing state... [id=app-4-ec2-profile]
aws_iam_role_policy_attachment.custom: Refreshing state... [id=app-4-ec2-role-20231106031433616000000002]
aws_iam_role_policy_attachment.ssm_policy_attachement: Refreshing state... [id=app-4-ec2-role-20231106031433681700000003]
aws_security_group.ec2_instance: Refreshing state... [id=sg-0921e5e1b6e6cc0ff]
aws_iam_role.ec2_role: Refreshing state... [id=app-4-ec2-role]
aws_internet_gateway.this-igw: Refreshing state... [id=igw-0ab494302e87c7493]
aws_iam_role_policy_attachment.secret_policy_attachement: Refreshing state... [id=app-4-ec2-role-20231106031433503700000001]
aws_route.internet-route: Refreshing state... [id=r-rtb-07a879baced138b591080289494]
aws_instance.app-server-read: Refreshing state... [id=i-0a68dbe8eb4a48075]
aws_instance.app-server-write: Refreshing state... [id=i-0a0c1174cb9a27e29]
aws_kms_key.encrytion_rest: Refreshing state... [id=d25d563f-9511-4831-9aee-0823f480e665]
aws_vpc.this: Refreshing state... [id=vpc-0aee610d9ee2f5056]
data.aws_availability_zones.available: Reading...
aws_kms_key.encrytion_secret: Refreshing state... [id=49c814dd-0c0f-4e8d-8dc1-4e4b5f688166]
data.aws_availability_zones.available: Read complete after 0s [id=us-east-2]
aws_secretsmanager_secret.elasticache_auth: Refreshing state... [id=arn:aws:secretsmanager:us-east-2:743794601996:secret:app-4-elasticache-auth-mcI2Ab]
aws_route_table.private[0]: Refreshing state... [id=rtb-00fd94662b273fa5f]
aws_route_table.private[1]: Refreshing state... [id=rtb-09c463d4787f20931]
aws_route_table.private[2]: Refreshing state... [id=rtb-0be19402a8902cddc]
aws_subnet.private[0]: Refreshing state... [id=subnet-0d793fee34548d46b]
aws_subnet.public[0]: Refreshing state... [id=subnet-01504aaf919b844a2]
aws_subnet.private[2]: Refreshing state... [id=subnet-052cb9788e3699e42]
aws_security_group.elasticache: Refreshing state... [id=sg-042c8552097212094]
aws_subnet.private[1]: Refreshing state... [id=subnet-00445199ef90108e3]
aws_default_security_group.default: Refreshing state... [id=sg-017656e5a4e187b27]
aws_route_table.public: Refreshing state... [id=rtb-07a879baced138b59]
aws_secretsmanager_secret_version.auth: Refreshing state... [id=arn:aws:secretsmanager:us-east-2:743794601996:secret:app-4-elasticache-auth-mcI2Ab|BA58B615-C534-4678-88A3-9AAA76040639]
aws_iam_policy.secret_manager_policy: Refreshing state... [id=arn:aws:iam::743794601996:policy/app-4-secret-read-policy]
aws_route_table_association.public[0]: Refreshing state... [id=rtbassoc-049a33ab4984be2a1]
aws_route_table_association.private[2]: Refreshing state... [id=rtbassoc-0ec28b2c44b0623b5]
aws_route_table_association.private[1]: Refreshing state... [id=rtbassoc-0a3cfb9c7b6d62162]
aws_route_table_association.private[0]: Refreshing state... [id=rtbassoc-07474438f8d7717f5]
aws_elasticache_subnet_group.elasticache_subnet: Refreshing state... [id=app-4-cache-subnet]
aws_elasticache_replication_group.app4: Refreshing state... [id=app-4-redis-cluster]
aws_ssm_parameter.elasticache_ep: Refreshing state... [id=/elasticache/app-4/app-4-redis-cluster/endpoint]
aws_ssm_parameter.elasticache_port: Refreshing state... [id=/elasticache/app-4/app-4-redis-cluster/port]
aws_iam_policy.ssm_parameter_policy: Refreshing state... [id=arn:aws:iam::743794601996:policy/app-4-ssm-parameter-read-policy]

Terraform used the selected providers to generate the following execution
plan. Resource actions are indicated with the following symbols:
  ~ update in-place
  - destroy

Terraform will perform the following actions:

  # aws_default_security_group.default will be updated in-place
  ~ resource "aws_default_security_group" "default" {
        id                     = "sg-017656e5a4e187b27"
        name                   = "default"
      ~ tags                   = {
          - "Source" = "https://github.com/kunduso/add-asg-elb-terraform" -> null
        }
      ~ tags_all               = {
          ~ "Source" = "https://github.com/kunduso/add-asg-elb-terraform" -> "https://github.com/kunduso/amazon-elasticache-redis-tf"
        }
        # (7 unchanged attributes hidden)
    }

  # aws_elasticache_replication_group.app4 will be updated in-place
  ~ resource "aws_elasticache_replication_group" "app4" {
        id                             = "app-4-redis-cluster"
      ~ tags                           = {
          - "Source" = "https://github.com/kunduso/add-asg-elb-terraform" -> null
        }
      ~ tags_all                       = {
          ~ "Source" = "https://github.com/kunduso/add-asg-elb-terraform" -> "https://github.com/kunduso/amazon-elasticache-redis-tf"
        }
        # (31 unchanged attributes hidden)
    }

  # aws_elasticache_subnet_group.elasticache_subnet will be updated in-place
  ~ resource "aws_elasticache_subnet_group" "elasticache_subnet" {
        id          = "app-4-cache-subnet"
        name        = "app-4-cache-subnet"
      ~ tags        = {
          - "Source" = "https://github.com/kunduso/add-asg-elb-terraform" -> null
        }
      ~ tags_all    = {
          ~ "Source" = "https://github.com/kunduso/add-asg-elb-terraform" -> "https://github.com/kunduso/amazon-elasticache-redis-tf"
        }
        # (3 unchanged attributes hidden)
    }

  # aws_iam_instance_profile.ec2_profile will be destroyed
  # (because aws_iam_instance_profile.ec2_profile is not in configuration)
  - resource "aws_iam_instance_profile" "ec2_profile" {
      - arn         = "arn:aws:iam::743794601996:instance-profile/app-4-ec2-profile" -> null
      - create_date = "2023-11-06T03:14:34Z" -> null
      - id          = "app-4-ec2-profile" -> null
      - name        = "app-4-ec2-profile" -> null
      - path        = "/" -> null
      - role        = "app-4-ec2-role" -> null
      - tags        = {
          - "Source" = "https://github.com/kunduso/add-asg-elb-terraform"
        } -> null
      - tags_all    = {
          - "Source" = "https://github.com/kunduso/add-asg-elb-terraform"
        } -> null
      - unique_id   = "AIPA22LM46AGCK7BIOREZ" -> null
    }

  # aws_iam_policy.secret_manager_policy will be updated in-place
  ~ resource "aws_iam_policy" "secret_manager_policy" {
        id          = "arn:aws:iam::743794601996:policy/app-4-secret-read-policy"
        name        = "app-4-secret-read-policy"
      ~ tags        = {
          - "Source" = "https://github.com/kunduso/add-asg-elb-terraform" -> null
        }
      ~ tags_all    = {
          ~ "Source" = "https://github.com/kunduso/add-asg-elb-terraform" -> "https://github.com/kunduso/amazon-elasticache-redis-tf"
        }
        # (5 unchanged attributes hidden)
    }

  # aws_iam_policy.ssm_parameter_policy will be updated in-place
  ~ resource "aws_iam_policy" "ssm_parameter_policy" {
        id          = "arn:aws:iam::743794601996:policy/app-4-ssm-parameter-read-policy"
        name        = "app-4-ssm-parameter-read-policy"
      ~ tags        = {
          - "Source" = "https://github.com/kunduso/add-asg-elb-terraform" -> null
        }
      ~ tags_all    = {
          ~ "Source" = "https://github.com/kunduso/add-asg-elb-terraform" -> "https://github.com/kunduso/amazon-elasticache-redis-tf"
        }
        # (5 unchanged attributes hidden)
    }

  # aws_iam_role.ec2_role will be destroyed
  # (because aws_iam_role.ec2_role is not in configuration)
  - resource "aws_iam_role" "ec2_role" {
      - arn                   = "arn:aws:iam::743794601996:role/app-4-ec2-role" -> null
      - assume_role_policy    = jsonencode(
            {
              - Statement = [
                  - {
                      - Action    = "sts:AssumeRole"
                      - Effect    = "Allow"
                      - Principal = {
                          - Service = "ec2.amazonaws.com"
                        }
                      - Sid       = ""
                    },
                ]
              - Version   = "2012-10-17"
            }
        ) -> null
      - create_date           = "2023-11-06T03:14:33Z" -> null
      - force_detach_policies = false -> null
      - id                    = "app-4-ec2-role" -> null
      - managed_policy_arns   = [
          - "arn:aws:iam::743794601996:policy/app-4-secret-read-policy",
          - "arn:aws:iam::743794601996:policy/app-4-ssm-parameter-read-policy",
          - "arn:aws:iam::aws:policy/AmazonSSMManagedInstanceCore",
        ] -> null
      - max_session_duration  = 3600 -> null
      - name                  = "app-4-ec2-role" -> null
      - path                  = "/" -> null
      - tags                  = {
          - "Source" = "https://github.com/kunduso/add-asg-elb-terraform"
        } -> null
      - tags_all              = {
          - "Source" = "https://github.com/kunduso/add-asg-elb-terraform"
        } -> null
      - unique_id             = "AROA22LM46AGCSGCIEDPG" -> null
    }

  # aws_iam_role_policy_attachment.custom will be destroyed
  # (because aws_iam_role_policy_attachment.custom is not in configuration)
  - resource "aws_iam_role_policy_attachment" "custom" {
      - id         = "app-4-ec2-role-20231106031433616000000002" -> null
      - policy_arn = "arn:aws:iam::aws:policy/AmazonSSMManagedInstanceCore" -> null
      - role       = "app-4-ec2-role" -> null
    }

  # aws_iam_role_policy_attachment.secret_policy_attachement will be destroyed
  # (because aws_iam_role_policy_attachment.secret_policy_attachement is not in configuration)
  - resource "aws_iam_role_policy_attachment" "secret_policy_attachement" {
      - id         = "app-4-ec2-role-20231106031433503700000001" -> null
      - policy_arn = "arn:aws:iam::743794601996:policy/app-4-secret-read-policy" -> null
      - role       = "app-4-ec2-role" -> null
    }

  # aws_iam_role_policy_attachment.ssm_policy_attachement will be destroyed
  # (because aws_iam_role_policy_attachment.ssm_policy_attachement is not in configuration)
  - resource "aws_iam_role_policy_attachment" "ssm_policy_attachement" {
      - id         = "app-4-ec2-role-20231106031433681700000003" -> null
      - policy_arn = "arn:aws:iam::743794601996:policy/app-4-ssm-parameter-read-policy" -> null
      - role       = "app-4-ec2-role" -> null
    }

  # aws_instance.app-server-read will be destroyed
  # (because aws_instance.app-server-read is not in configuration)
  - resource "aws_instance" "app-server-read" {
      - ami                                  = "ami-0ec5c7d8262c1f6b2" -> null
      - arn                                  = "arn:aws:ec2:us-east-2:743794601996:instance/i-0a68dbe8eb4a48075" -> null
      - associate_public_ip_address          = true -> null
      - availability_zone                    = "us-east-2a" -> null
      - cpu_core_count                       = 1 -> null
      - cpu_threads_per_core                 = 2 -> null
      - disable_api_stop                     = false -> null
      - disable_api_termination              = false -> null
      - ebs_optimized                        = false -> null
      - get_password_data                    = false -> null
      - hibernation                          = false -> null
      - iam_instance_profile                 = "app-4-ec2-profile" -> null
      - id                                   = "i-0a68dbe8eb4a48075" -> null
      - instance_initiated_shutdown_behavior = "stop" -> null
      - instance_state                       = "running" -> null
      - instance_type                        = "t3.medium" -> null
      - ipv6_address_count                   = 0 -> null
      - ipv6_addresses                       = [] -> null
      - monitoring                           = false -> null
      - placement_partition_number           = 0 -> null
      - primary_network_interface_id         = "eni-0a2bf32054955b7d6" -> null
      - private_dns                          = "ip-10-20-32-120.us-east-2.compute.internal" -> null
      - private_ip                           = "10.20.32.120" -> null
      - public_dns                           = "ec2-18-226-82-72.us-east-2.compute.amazonaws.com" -> null
      - public_ip                            = "18.226.82.72" -> null
      - secondary_private_ips                = [] -> null
      - security_groups                      = [] -> null
      - source_dest_check                    = true -> null
      - subnet_id                            = "subnet-01504aaf919b844a2" -> null
      - tags                                 = {
          - "Name"   = "app-4-server-read"
          - "Source" = "https://github.com/kunduso/add-asg-elb-terraform"
        } -> null
      - tags_all                             = {
          - "Name"   = "app-4-server-read"
          - "Source" = "https://github.com/kunduso/add-asg-elb-terraform"
        } -> null
      - tenancy                              = "default" -> null
      - user_data                            = "49a8e8d2ffb046e821e07473c05be931ae1421a9" -> null
      - user_data_replace_on_change          = false -> null
      - vpc_security_group_ids               = [
          - "sg-0921e5e1b6e6cc0ff",
        ] -> null

      - capacity_reservation_specification {
          - capacity_reservation_preference = "open" -> null
        }

      - cpu_options {
          - core_count       = 1 -> null
          - threads_per_core = 2 -> null
        }

      - credit_specification {
          - cpu_credits = "unlimited" -> null
        }

      - enclave_options {
          - enabled = false -> null
        }

      - maintenance_options {
          - auto_recovery = "default" -> null
        }

      - metadata_options {
          - http_endpoint               = "enabled" -> null
          - http_protocol_ipv6          = "disabled" -> null
          - http_put_response_hop_limit = 1 -> null
          - http_tokens                 = "optional" -> null
          - instance_metadata_tags      = "disabled" -> null
        }

      - private_dns_name_options {
          - enable_resource_name_dns_a_record    = false -> null
          - enable_resource_name_dns_aaaa_record = false -> null
          - hostname_type                        = "ip-name" -> null
        }

      - root_block_device {
          - delete_on_termination = true -> null
          - device_name           = "/dev/xvda" -> null
          - encrypted             = false -> null
          - iops                  = 100 -> null
          - tags                  = {} -> null
          - throughput            = 0 -> null
          - volume_id             = "vol-06e5ec0a7084c77dd" -> null
          - volume_size           = 8 -> null
          - volume_type           = "gp2" -> null
        }
    }

  # aws_instance.app-server-write will be destroyed
  # (because aws_instance.app-server-write is not in configuration)
  - resource "aws_instance" "app-server-write" {
      - ami                                  = "ami-0ec5c7d8262c1f6b2" -> null
      - arn                                  = "arn:aws:ec2:us-east-2:743794601996:instance/i-0a0c1174cb9a27e29" -> null
      - associate_public_ip_address          = true -> null
      - availability_zone                    = "us-east-2a" -> null
      - cpu_core_count                       = 1 -> null
      - cpu_threads_per_core                 = 2 -> null
      - disable_api_stop                     = false -> null
      - disable_api_termination              = false -> null
      - ebs_optimized                        = false -> null
      - get_password_data                    = false -> null
      - hibernation                          = false -> null
      - iam_instance_profile                 = "app-4-ec2-profile" -> null
      - id                                   = "i-0a0c1174cb9a27e29" -> null
      - instance_initiated_shutdown_behavior = "stop" -> null
      - instance_state                       = "running" -> null
      - instance_type                        = "t3.medium" -> null
      - ipv6_address_count                   = 0 -> null
      - ipv6_addresses                       = [] -> null
      - monitoring                           = false -> null
      - placement_partition_number           = 0 -> null
      - primary_network_interface_id         = "eni-03dc9db47bf2e00d1" -> null
      - private_dns                          = "ip-10-20-32-119.us-east-2.compute.internal" -> null
      - private_ip                           = "10.20.32.119" -> null
      - public_dns                           = "ec2-18-216-46-203.us-east-2.compute.amazonaws.com" -> null
      - public_ip                            = "18.216.46.203" -> null
      - secondary_private_ips                = [] -> null
      - security_groups                      = [] -> null
      - source_dest_check                    = true -> null
      - subnet_id                            = "subnet-01504aaf919b844a2" -> null
      - tags                                 = {
          - "Name"   = "app-4-server-write"
          - "Source" = "https://github.com/kunduso/add-asg-elb-terraform"
        } -> null
      - tags_all                             = {
          - "Name"   = "app-4-server-write"
          - "Source" = "https://github.com/kunduso/add-asg-elb-terraform"
        } -> null
      - tenancy                              = "default" -> null
      - user_data                            = "35aac5b5ba4d03a0b2d5f99c7738d1d479ad3ecd" -> null
      - user_data_replace_on_change          = false -> null
      - vpc_security_group_ids               = [
          - "sg-0921e5e1b6e6cc0ff",
        ] -> null

      - capacity_reservation_specification {
          - capacity_reservation_preference = "open" -> null
        }

      - cpu_options {
          - core_count       = 1 -> null
          - threads_per_core = 2 -> null
        }

      - credit_specification {
          - cpu_credits = "unlimited" -> null
        }

      - enclave_options {
          - enabled = false -> null
        }

      - maintenance_options {
          - auto_recovery = "default" -> null
        }

      - metadata_options {
          - http_endpoint               = "enabled" -> null
          - http_protocol_ipv6          = "disabled" -> null
          - http_put_response_hop_limit = 1 -> null
          - http_tokens                 = "optional" -> null
          - instance_metadata_tags      = "disabled" -> null
        }

      - private_dns_name_options {
          - enable_resource_name_dns_a_record    = false -> null
          - enable_resource_name_dns_aaaa_record = false -> null
          - hostname_type                        = "ip-name" -> null
        }

      - root_block_device {
          - delete_on_termination = true -> null
          - device_name           = "/dev/xvda" -> null
          - encrypted             = false -> null
          - iops                  = 100 -> null
          - tags                  = {} -> null
          - throughput            = 0 -> null
          - volume_id             = "vol-0eaa967b347791c4f" -> null
          - volume_size           = 8 -> null
          - volume_type           = "gp2" -> null
        }
    }

  # aws_internet_gateway.this-igw will be destroyed
  # (because aws_internet_gateway.this-igw is not in configuration)
  - resource "aws_internet_gateway" "this-igw" {
      - arn      = "arn:aws:ec2:us-east-2:743794601996:internet-gateway/igw-0ab494302e87c7493" -> null
      - id       = "igw-0ab494302e87c7493" -> null
      - owner_id = "743794601996" -> null
      - tags     = {
          - "Name"   = "app-4-gateway"
          - "Source" = "https://github.com/kunduso/add-asg-elb-terraform"
        } -> null
      - tags_all = {
          - "Name"   = "app-4-gateway"
          - "Source" = "https://github.com/kunduso/add-asg-elb-terraform"
        } -> null
      - vpc_id   = "vpc-0aee610d9ee2f5056" -> null
    }

  # aws_kms_key.encrytion_rest will be updated in-place
  ~ resource "aws_kms_key" "encrytion_rest" {
        id                                 = "d25d563f-9511-4831-9aee-0823f480e665"
      ~ tags                               = {
          - "Source" = "https://github.com/kunduso/add-asg-elb-terraform" -> null
        }
      ~ tags_all                           = {
          ~ "Source" = "https://github.com/kunduso/add-asg-elb-terraform" -> "https://github.com/kunduso/amazon-elasticache-redis-tf"
        }
        # (11 unchanged attributes hidden)
    }

  # aws_kms_key.encrytion_secret will be updated in-place
  ~ resource "aws_kms_key" "encrytion_secret" {
        id                                 = "49c814dd-0c0f-4e8d-8dc1-4e4b5f688166"
      ~ tags                               = {
          - "Source" = "https://github.com/kunduso/add-asg-elb-terraform" -> null
        }
      ~ tags_all                           = {
          ~ "Source" = "https://github.com/kunduso/add-asg-elb-terraform" -> "https://github.com/kunduso/amazon-elasticache-redis-tf"
        }
        # (11 unchanged attributes hidden)
    }

  # aws_route.internet-route will be destroyed
  # (because aws_route.internet-route is not in configuration)
  - resource "aws_route" "internet-route" {
      - destination_cidr_block = "0.0.0.0/0" -> null
      - gateway_id             = "igw-0ab494302e87c7493" -> null
      - id                     = "r-rtb-07a879baced138b591080289494" -> null
      - origin                 = "CreateRoute" -> null
      - route_table_id         = "rtb-07a879baced138b59" -> null
      - state                  = "active" -> null
    }

  # aws_route_table.private[0] will be updated in-place
  ~ resource "aws_route_table" "private" {
        id               = "rtb-00fd94662b273fa5f"
      ~ tags             = {
            "Name"   = "app-4-private-route-table-1"
          - "Source" = "https://github.com/kunduso/add-asg-elb-terraform" -> null
        }
      ~ tags_all         = {
          ~ "Source" = "https://github.com/kunduso/add-asg-elb-terraform" -> "https://github.com/kunduso/amazon-elasticache-redis-tf"
            # (1 unchanged element hidden)
        }
        # (5 unchanged attributes hidden)
    }

  # aws_route_table.private[1] will be updated in-place
  ~ resource "aws_route_table" "private" {
        id               = "rtb-09c463d4787f20931"
      ~ tags             = {
            "Name"   = "app-4-private-route-table-2"
          - "Source" = "https://github.com/kunduso/add-asg-elb-terraform" -> null
        }
      ~ tags_all         = {
          ~ "Source" = "https://github.com/kunduso/add-asg-elb-terraform" -> "https://github.com/kunduso/amazon-elasticache-redis-tf"
            # (1 unchanged element hidden)
        }
        # (5 unchanged attributes hidden)
    }

  # aws_route_table.private[2] will be updated in-place
  ~ resource "aws_route_table" "private" {
        id               = "rtb-0be19402a8902cddc"
      ~ tags             = {
            "Name"   = "app-4-private-route-table-3"
          - "Source" = "https://github.com/kunduso/add-asg-elb-terraform" -> null
        }
      ~ tags_all         = {
          ~ "Source" = "https://github.com/kunduso/add-asg-elb-terraform" -> "https://github.com/kunduso/amazon-elasticache-redis-tf"
            # (1 unchanged element hidden)
        }
        # (5 unchanged attributes hidden)
    }

  # aws_route_table.public will be updated in-place
  ~ resource "aws_route_table" "public" {
        id               = "rtb-07a879baced138b59"
      ~ tags             = {
            "Name"   = "app-4-public"
          - "Source" = "https://github.com/kunduso/add-asg-elb-terraform" -> null
        }
      ~ tags_all         = {
          ~ "Source" = "https://github.com/kunduso/add-asg-elb-terraform" -> "https://github.com/kunduso/amazon-elasticache-redis-tf"
            # (1 unchanged element hidden)
        }
        # (5 unchanged attributes hidden)
    }

  # aws_secretsmanager_secret.elasticache_auth will be updated in-place
  ~ resource "aws_secretsmanager_secret" "elasticache_auth" {
        id                             = "arn:aws:secretsmanager:us-east-2:743794601996:secret:app-4-elasticache-auth-mcI2Ab"
        name                           = "app-4-elasticache-auth"
      ~ tags                           = {
          - "Source" = "https://github.com/kunduso/add-asg-elb-terraform" -> null
        }
      ~ tags_all                       = {
          ~ "Source" = "https://github.com/kunduso/add-asg-elb-terraform" -> "https://github.com/kunduso/amazon-elasticache-redis-tf"
        }
        # (4 unchanged attributes hidden)
    }

  # aws_security_group.ec2_instance will be destroyed
  # (because aws_security_group.ec2_instance is not in configuration)
  - resource "aws_security_group" "ec2_instance" {
      - arn                    = "arn:aws:ec2:us-east-2:743794601996:security-group/sg-0921e5e1b6e6cc0ff" -> null
      - description            = "Allow inbound to and outbound access from the Amazon EC2 instance." -> null
      - egress                 = [
          - {
              - cidr_blocks      = [
                  - "0.0.0.0/0",
                ]
              - description      = "Enable access to the internet."
              - from_port        = 0
              - ipv6_cidr_blocks = []
              - prefix_list_ids  = []
              - protocol         = "-1"
              - security_groups  = []
              - self             = false
              - to_port          = 0
            },
        ] -> null
      - id                     = "sg-0921e5e1b6e6cc0ff" -> null
      - ingress                = [
          - {
              - cidr_blocks      = [
                  - "10.20.32.0/25",
                ]
              - description      = "Enable access from any resource inside the VPC."
              - from_port        = 0
              - ipv6_cidr_blocks = []
              - prefix_list_ids  = []
              - protocol         = "-1"
              - security_groups  = []
              - self             = false
              - to_port          = 0
            },
        ] -> null
      - name                   = "app-4-ec2" -> null
      - owner_id               = "743794601996" -> null
      - revoke_rules_on_delete = false -> null
      - tags                   = {
          - "Source" = "https://github.com/kunduso/add-asg-elb-terraform"
        } -> null
      - tags_all               = {
          - "Source" = "https://github.com/kunduso/add-asg-elb-terraform"
        } -> null
      - vpc_id                 = "vpc-0aee610d9ee2f5056" -> null
    }

  # aws_security_group.elasticache will be updated in-place
  ~ resource "aws_security_group" "elasticache" {
        id                     = "sg-042c8552097212094"
        name                   = "app-4-elasticache-sg"
      ~ tags                   = {
          - "Source" = "https://github.com/kunduso/add-asg-elb-terraform" -> null
        }
      ~ tags_all               = {
          ~ "Source" = "https://github.com/kunduso/add-asg-elb-terraform" -> "https://github.com/kunduso/amazon-elasticache-redis-tf"
        }
        # (7 unchanged attributes hidden)
    }

  # aws_ssm_parameter.elasticache_ep will be updated in-place
  ~ resource "aws_ssm_parameter" "elasticache_ep" {
        id        = "/elasticache/app-4/app-4-redis-cluster/endpoint"
        name      = "/elasticache/app-4/app-4-redis-cluster/endpoint"
      ~ tags      = {
          - "Source" = "https://github.com/kunduso/add-asg-elb-terraform" -> null
        }
      ~ tags_all  = {
          ~ "Source" = "https://github.com/kunduso/add-asg-elb-terraform" -> "https://github.com/kunduso/amazon-elasticache-redis-tf"
        }
        # (7 unchanged attributes hidden)
    }

  # aws_ssm_parameter.elasticache_port will be updated in-place
  ~ resource "aws_ssm_parameter" "elasticache_port" {
        id        = "/elasticache/app-4/app-4-redis-cluster/port"
        name      = "/elasticache/app-4/app-4-redis-cluster/port"
      ~ tags      = {
          - "Source" = "https://github.com/kunduso/add-asg-elb-terraform" -> null
        }
      ~ tags_all  = {
          ~ "Source" = "https://github.com/kunduso/add-asg-elb-terraform" -> "https://github.com/kunduso/amazon-elasticache-redis-tf"
        }
        # (7 unchanged attributes hidden)
    }

  # aws_subnet.private[0] will be updated in-place
  ~ resource "aws_subnet" "private" {
        id                                             = "subnet-0d793fee34548d46b"
      ~ tags                                           = {
            "Name"   = "app-4-private-1"
          - "Source" = "https://github.com/kunduso/add-asg-elb-terraform" -> null
        }
      ~ tags_all                                       = {
          ~ "Source" = "https://github.com/kunduso/add-asg-elb-terraform" -> "https://github.com/kunduso/amazon-elasticache-redis-tf"
            # (1 unchanged element hidden)
        }
        # (15 unchanged attributes hidden)
    }

  # aws_subnet.private[1] will be updated in-place
  ~ resource "aws_subnet" "private" {
        id                                             = "subnet-00445199ef90108e3"
      ~ tags                                           = {
            "Name"   = "app-4-private-2"
          - "Source" = "https://github.com/kunduso/add-asg-elb-terraform" -> null
        }
      ~ tags_all                                       = {
          ~ "Source" = "https://github.com/kunduso/add-asg-elb-terraform" -> "https://github.com/kunduso/amazon-elasticache-redis-tf"
            # (1 unchanged element hidden)
        }
        # (15 unchanged attributes hidden)
    }

  # aws_subnet.private[2] will be updated in-place
  ~ resource "aws_subnet" "private" {
        id                                             = "subnet-052cb9788e3699e42"
      ~ tags                                           = {
            "Name"   = "app-4-private-3"
          - "Source" = "https://github.com/kunduso/add-asg-elb-terraform" -> null
        }
      ~ tags_all                                       = {
          ~ "Source" = "https://github.com/kunduso/add-asg-elb-terraform" -> "https://github.com/kunduso/amazon-elasticache-redis-tf"
            # (1 unchanged element hidden)
        }
        # (15 unchanged attributes hidden)
    }

  # aws_subnet.public[0] will be updated in-place
  ~ resource "aws_subnet" "public" {
        id                                             = "subnet-01504aaf919b844a2"
      ~ tags                                           = {
            "Name"   = "app-4-public-1"
          - "Source" = "https://github.com/kunduso/add-asg-elb-terraform" -> null
        }
      ~ tags_all                                       = {
          ~ "Source" = "https://github.com/kunduso/add-asg-elb-terraform" -> "https://github.com/kunduso/amazon-elasticache-redis-tf"
            # (1 unchanged element hidden)
        }
        # (15 unchanged attributes hidden)
    }

  # aws_vpc.this will be updated in-place
  ~ resource "aws_vpc" "this" {
        id                                   = "vpc-0aee610d9ee2f5056"
      ~ tags                                 = {
            "Name"   = "app-4"
          - "Source" = "https://github.com/kunduso/add-asg-elb-terraform" -> null
        }
      ~ tags_all                             = {
          ~ "Source" = "https://github.com/kunduso/add-asg-elb-terraform" -> "https://github.com/kunduso/amazon-elasticache-redis-tf"
            # (1 unchanged element hidden)
        }
        # (14 unchanged attributes hidden)
    }

Plan: 0 to add, 20 to change, 10 to destroy.

─────────────────────────────────────────────────────────────────────────────

Saved the plan to: TFplan.JSON

To perform exactly these actions, run the following command to apply:
    terraform apply "TFplan.JSON"

Pushed by: @kunduso, Action: pull_request

@kunduso kunduso merged commit 18b60dc into main Nov 7, 2023
5 checks passed
@kunduso kunduso linked an issue Nov 7, 2023 that may be closed by this pull request
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Correct default_tags to point to this repository
1 participant