Skip to content

Conversation

@jonakoudijs
Copy link
Member

This PR will test IAC GH Actions by triggering the PR job.

@jonakoudijs jonakoudijs self-assigned this Sep 21, 2025
@jonakoudijs jonakoudijs added the enhancement New feature or request label Sep 21, 2025
@github-actions
Copy link

github-actions bot commented Sep 22, 2025

Terraform plan in terraform

Plan: 27 to add, 0 to change, 0 to destroy.
Terraform used the selected providers to generate the following execution
plan. Resource actions are indicated with the following symbols:
+   create
 <= read (data resources)

Terraform will perform the following actions:

  # module.kubernetes.data.helm_template.ingress_nginx[0] will be read during apply
  # (config refers to values not yet known)
 <= data "helm_template" "ingress_nginx" {
+       chart        = "ingress-nginx"
+       crds         = (known after apply)
+       id           = (known after apply)
+       kube_version = "v1.33.4"
+       manifest     = (known after apply)
+       manifests    = (known after apply)
+       name         = "ingress-nginx"
+       namespace    = "ingress-nginx"
+       notes        = (known after apply)
+       repository   = "https://kubernetes.github.io/ingress-nginx"
+       set          = [
+           {
+               name  = "controller.admissionWebhooks.certManager.enabled"
+               value = "true"
            },
        ]
+       values       = [
+           (known after apply),
+           jsonencode({}),
        ]
+       version      = "4.13.2"
    }

  # module.kubernetes.data.http.kube_api_health[0] will be read during apply
  # (config refers to values not yet known)
 <= data "http" "kube_api_health" {
+       body                 = (known after apply)
+       id                   = (known after apply)
+       insecure             = true
+       response_body        = (known after apply)
+       response_body_base64 = (known after apply)
+       response_headers     = (known after apply)
+       status_code          = (known after apply)
+       url                  = (known after apply)

+       retry {
+           attempts     = 60
+           max_delay_ms = 5000
+           min_delay_ms = 5000
        }
    }

  # module.kubernetes.data.talos_client_configuration.this will be read during apply
  # (config refers to values not yet known)
 <= data "talos_client_configuration" "this" {
+       client_configuration = {
+           ca_certificate     = "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"
+           client_certificate = "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"
+           client_key         = (sensitive value)
        }
+       cluster_name         = "platform"
+       endpoints            = (known after apply)
+       id                   = (known after apply)
+       nodes                = [
+           "10.0.64.1",
        ]
+       talos_config         = (sensitive value)
    }

  # module.kubernetes.data.talos_machine_configuration.control_plane["platform-control-1"] will be read during apply
  # (config refers to values not yet known)
 <= data "talos_machine_configuration" "control_plane" {
+       cluster_endpoint      = "https://10.0.64.126:6443"
+       cluster_name          = "platform"
+       config_patches        = [
+           (sensitive value),
        ]
+       docs                  = false
+       examples              = false
+       id                    = (known after apply)
+       kubernetes_version    = "v1.33.4"
+       machine_configuration = (sensitive value)
+       machine_secrets       = {
+           certs      = {
+               etcd               = {
+                   cert = "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"
+                   key  = (sensitive value)
                }
+               k8s                = {
+                   cert = "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUJpVENDQVMrZ0F3SUJBZ0lRYU95clRzQloyeXNaaTZ4R2RqWmJqREFLQmdncWhrak9QUVFEQWpBVk1STXcKRVFZRFZRUUtFd3ByZFdKbGNtNWxkR1Z6TUI0WERUSTFNRGt5TVRFNU5EUXpNbG9YRFRNMU1Ea3hPVEU1TkRRegpNbG93RlRFVE1CRUdBMVVFQ2hNS2EzVmlaWEp1WlhSbGN6QlpNQk1HQnlxR1NNNDlBZ0VHQ0NxR1NNNDlBd0VICkEwSUFCR200c3JLSCtRSGN3QUJqYjFabDJNNWt4MjJSRVdpRTdPdXd6alZzWVFoSXhoSHlkcjFMWFhqdW44ZmwKVmk5M2d1NFpxbVVKd2ZRMWNaclo5S3VIdFArallUQmZNQTRHQTFVZER3RUIvd1FFQXdJQ2hEQWRCZ05WSFNVRQpGakFVQmdnckJnRUZCUWNEQVFZSUt3WUJCUVVIQXdJd0R3WURWUjBUQVFIL0JBVXdBd0VCL3pBZEJnTlZIUTRFCkZnUVV6K2c4SjBGelF1Q1FzSzlpbTc2endaWTdLWkl3Q2dZSUtvWkl6ajBFQXdJRFNBQXdSUUloQUp5UGdzVGkKc3EwNTZnNVNaVGMvc3VBZEhtaTJJNTdSNi9LV0I5Zk9LNE1zQWlBVnVHdDdJWjF1cUdadDZDVlE0aVc5Y1NUeAo2TnNOdTkwMjFMNkxORHh4UEE9PQotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tCg=="
+                   key  = (sensitive value)
                }
+               k8s_aggregator     = {
+                   cert = "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"
+                   key  = (sensitive value)
                }
+               k8s_serviceaccount = {
+                   key = (sensitive value)
                }
+               os                 = {
+                   cert = "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUJQekNCOHFBREFnRUNBaEVBc3VMM0JGNzlMQUcvQkVzcStCeVE1ekFGQmdNclpYQXdFREVPTUF3R0ExVUUKQ2hNRmRHRnNiM013SGhjTk1qVXdPVEl4TVRrME5ETXlXaGNOTXpVd09URTVNVGswTkRNeVdqQVFNUTR3REFZRApWUVFLRXdWMFlXeHZjekFxTUFVR0F5dGxjQU1oQUxtTXRCUXhKL2FDM1FJZHdtYzc3T1BVcUVaMnBIRUZHZUpoCndMV1BEZXAybzJFd1h6QU9CZ05WSFE4QkFmOEVCQU1DQW9Rd0hRWURWUjBsQkJZd0ZBWUlLd1lCQlFVSEF3RUcKQ0NzR0FRVUZCd01DTUE4R0ExVWRFd0VCL3dRRk1BTUJBZjh3SFFZRFZSME9CQllFRkkwRnh2c1pySnNKZVdnRQo3dXJyNk9MVW0yTnlNQVVHQXl0bGNBTkJBRW9pSlJvaGlOVDBkYnJHUVc4Yjllem1IeEU0QUtpZDk0UFQ1WEFOClFPbTdHTmFKQ3dwMVVtOU1TV0picEtpUXdLRExMdXZ3cFVwNVp0bWc4WWpCUGdnPQotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tCg=="
+                   key  = (sensitive value)
                }
            }
+           cluster    = {
+               id     = "tAOVP3Ln1MYRs0Csi3PVuVi0omXZOaKDDho3wdigTes="
+               secret = (sensitive value)
            }
+           secrets    = {
+               bootstrap_token             = (sensitive value)
+               secretbox_encryption_secret = (sensitive value)
            }
+           trustdinfo = {
+               token = (sensitive value)
            }
        }
+       machine_type          = "controlplane"
+       talos_version         = "v1.11.1"
    }

  # module.kubernetes.data.talos_machine_configuration.worker["platform-worker-1"] will be read during apply
  # (config refers to values not yet known)
 <= data "talos_machine_configuration" "worker" {
+       cluster_endpoint      = "https://10.0.64.126:6443"
+       cluster_name          = "platform"
+       config_patches        = [
+           (known after apply),
        ]
+       docs                  = false
+       examples              = false
+       id                    = (known after apply)
+       kubernetes_version    = "v1.33.4"
+       machine_configuration = (sensitive value)
+       machine_secrets       = {
+           certs      = {
+               etcd               = {
+                   cert = "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"
+                   key  = (sensitive value)
                }
+               k8s                = {
+                   cert = "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"
+                   key  = (sensitive value)
                }
+               k8s_aggregator     = {
+                   cert = "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"
+                   key  = (sensitive value)
                }
+               k8s_serviceaccount = {
+                   key = (sensitive value)
                }
+               os                 = {
+                   cert = "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"
+                   key  = (sensitive value)
                }
            }
+           cluster    = {
+               id     = "tAOVP3Ln1MYRs0Csi3PVuVi0omXZOaKDDho3wdigTes="
+               secret = (sensitive value)
            }
+           secrets    = {
+               bootstrap_token             = (sensitive value)
+               secretbox_encryption_secret = (sensitive value)
            }
+           trustdinfo = {
+               token = (sensitive value)
            }
        }
+       machine_type          = "worker"
+       talos_version         = "v1.11.1"
    }

  # module.kubernetes.data.talos_machine_configuration.worker["platform-worker-2"] will be read during apply
  # (config refers to values not yet known)
 <= data "talos_machine_configuration" "worker" {
+       cluster_endpoint      = "https://10.0.64.126:6443"
+       cluster_name          = "platform"
+       config_patches        = [
+           (known after apply),
        ]
+       docs                  = false
+       examples              = false
+       id                    = (known after apply)
+       kubernetes_version    = "v1.33.4"
+       machine_configuration = (sensitive value)
+       machine_secrets       = {
+           certs      = {
+               etcd               = {
+                   cert = "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"
+                   key  = (sensitive value)
                }
+               k8s                = {
+                   cert = "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUJpVENDQVMrZ0F3SUJBZ0lRYU95clRzQloyeXNaaTZ4R2RqWmJqREFLQmdncWhrak9QUVFEQWpBVk1STXcKRVFZRFZRUUtFd3ByZFdKbGNtNWxkR1Z6TUI0WERUSTFNRGt5TVRFNU5EUXpNbG9YRFRNMU1Ea3hPVEU1TkRRegpNbG93RlRFVE1CRUdBMVVFQ2hNS2EzVmlaWEp1WlhSbGN6QlpNQk1HQnlxR1NNNDlBZ0VHQ0NxR1NNNDlBd0VICkEwSUFCR200c3JLSCtRSGN3QUJqYjFabDJNNWt4MjJSRVdpRTdPdXd6alZzWVFoSXhoSHlkcjFMWFhqdW44ZmwKVmk5M2d1NFpxbVVKd2ZRMWNaclo5S3VIdFArallUQmZNQTRHQTFVZER3RUIvd1FFQXdJQ2hEQWRCZ05WSFNVRQpGakFVQmdnckJnRUZCUWNEQVFZSUt3WUJCUVVIQXdJd0R3WURWUjBUQVFIL0JBVXdBd0VCL3pBZEJnTlZIUTRFCkZnUVV6K2c4SjBGelF1Q1FzSzlpbTc2endaWTdLWkl3Q2dZSUtvWkl6ajBFQXdJRFNBQXdSUUloQUp5UGdzVGkKc3EwNTZnNVNaVGMvc3VBZEhtaTJJNTdSNi9LV0I5Zk9LNE1zQWlBVnVHdDdJWjF1cUdadDZDVlE0aVc5Y1NUeAo2TnNOdTkwMjFMNkxORHh4UEE9PQotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tCg=="
+                   key  = (sensitive value)
                }
+               k8s_aggregator     = {
+                   cert = "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"
+                   key  = (sensitive value)
                }
+               k8s_serviceaccount = {
+                   key = (sensitive value)
                }
+               os                 = {
+                   cert = "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUJQekNCOHFBREFnRUNBaEVBc3VMM0JGNzlMQUcvQkVzcStCeVE1ekFGQmdNclpYQXdFREVPTUF3R0ExVUUKQ2hNRmRHRnNiM013SGhjTk1qVXdPVEl4TVRrME5ETXlXaGNOTXpVd09URTVNVGswTkRNeVdqQVFNUTR3REFZRApWUVFLRXdWMFlXeHZjekFxTUFVR0F5dGxjQU1oQUxtTXRCUXhKL2FDM1FJZHdtYzc3T1BVcUVaMnBIRUZHZUpoCndMV1BEZXAybzJFd1h6QU9CZ05WSFE4QkFmOEVCQU1DQW9Rd0hRWURWUjBsQkJZd0ZBWUlLd1lCQlFVSEF3RUcKQ0NzR0FRVUZCd01DTUE4R0ExVWRFd0VCL3dRRk1BTUJBZjh3SFFZRFZSME9CQllFRkkwRnh2c1pySnNKZVdnRQo3dXJyNk9MVW0yTnlNQVVHQXl0bGNBTkJBRW9pSlJvaGlOVDBkYnJHUVc4Yjllem1IeEU0QUtpZDk0UFQ1WEFOClFPbTdHTmFKQ3dwMVVtOU1TV0picEtpUXdLRExMdXZ3cFVwNVp0bWc4WWpCUGdnPQotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tCg=="
+                   key  = (sensitive value)
                }
            }
+           cluster    = {
+               id     = "tAOVP3Ln1MYRs0Csi3PVuVi0omXZOaKDDho3wdigTes="
+               secret = (sensitive value)
            }
+           secrets    = {
+               bootstrap_token             = (sensitive value)
+               secretbox_encryption_secret = (sensitive value)
            }
+           trustdinfo = {
+               token = (sensitive value)
            }
        }
+       machine_type          = "worker"
+       talos_version         = "v1.11.1"
    }

  # module.kubernetes.hcloud_firewall.this will be created
+   resource "hcloud_firewall" "this" {
+       id     = (known after apply)
+       labels = {
+           "cluster" = "platform"
        }
+       name   = "platform"

+       rule {
+           description     = "Allow Incoming Requests to Kube API"
+           destination_ips = []
+           direction       = "in"
+           port            = "6443"
+           protocol        = "tcp"
+           source_ips      = [
+               "172.174.223.103/32",
            ]
        }
+       rule {
+           description     = "Allow Incoming Requests to Talos API"
+           destination_ips = []
+           direction       = "in"
+           port            = "50000"
+           protocol        = "tcp"
+           source_ips      = [
+               "172.174.223.103/32",
            ]
        }
    }

  # module.kubernetes.hcloud_load_balancer.ingress[0] will be created
+   resource "hcloud_load_balancer" "ingress" {
+       delete_protection  = false
+       id                 = (known after apply)
+       ipv4               = (known after apply)
+       ipv6               = (known after apply)
+       labels             = {
+           "cluster" = "platform"
+           "role"    = "ingress"
        }
+       load_balancer_type = "lb11"
+       location           = "fsn1"
+       name               = "platform-ingress"
+       network_id         = (known after apply)
+       network_ip         = (known after apply)
+       network_zone       = (known after apply)

+       algorithm {
+           type = "least_connections"
        }

+       target (known after apply)
    }

  # module.kubernetes.hcloud_load_balancer_network.ingress[0] will be created
+   resource "hcloud_load_balancer_network" "ingress" {
+       enable_public_interface = true
+       id                      = (known after apply)
+       ip                      = "10.0.64.252"
+       load_balancer_id        = (known after apply)
+       subnet_id               = (known after apply)
    }

  # module.kubernetes.hcloud_network.this[0] will be created
+   resource "hcloud_network" "this" {
+       delete_protection        = false
+       expose_routes_to_vswitch = false
+       id                       = (known after apply)
+       ip_range                 = "10.0.0.0/16"
+       labels                   = {
+           "cluster" = "platform"
        }
+       name                     = "platform"
    }

  # module.kubernetes.hcloud_network_subnet.autoscaler will be created
+   resource "hcloud_network_subnet" "autoscaler" {
+       gateway      = (known after apply)
+       id           = (known after apply)
+       ip_range     = "10.0.95.128/25"
+       network_id   = (known after apply)
+       network_zone = "eu-central"
+       type         = "cloud"
    }

  # module.kubernetes.hcloud_network_subnet.control_plane will be created
+   resource "hcloud_network_subnet" "control_plane" {
+       gateway      = (known after apply)
+       id           = (known after apply)
+       ip_range     = "10.0.64.0/25"
+       network_id   = (known after apply)
+       network_zone = "eu-central"
+       type         = "cloud"
    }

  # module.kubernetes.hcloud_network_subnet.load_balancer will be created
+   resource "hcloud_network_subnet" "load_balancer" {
+       gateway      = (known after apply)
+       id           = (known after apply)
+       ip_range     = "10.0.64.128/25"
+       network_id   = (known after apply)
+       network_zone = "eu-central"
+       type         = "cloud"
    }

  # module.kubernetes.hcloud_network_subnet.worker["worker"] will be created
+   resource "hcloud_network_subnet" "worker" {
+       gateway      = (known after apply)
+       id           = (known after apply)
+       ip_range     = "10.0.65.0/25"
+       network_id   = (known after apply)
+       network_zone = "eu-central"
+       type         = "cloud"
    }

  # module.kubernetes.hcloud_placement_group.control_plane will be created
+   resource "hcloud_placement_group" "control_plane" {
+       id      = (known after apply)
+       labels  = {
+           "cluster" = "platform"
+           "role"    = "control-plane"
        }
+       name    = "platform-control-plane-pg"
+       servers = (known after apply)
+       type    = "spread"
    }

  # module.kubernetes.hcloud_placement_group.worker["platform-worker-pg-1"] will be created
+   resource "hcloud_placement_group" "worker" {
+       id      = (known after apply)
+       labels  = {
+           "cluster"  = "platform"
+           "nodepool" = "worker"
+           "role"     = "worker"
        }
+       name    = "platform-worker-pg-1"
+       servers = (known after apply)
+       type    = "spread"
    }

  # module.kubernetes.hcloud_server.control_plane["platform-control-1"] will be created
+   resource "hcloud_server" "control_plane" {
+       allow_deprecated_images    = false
+       backup_window              = (known after apply)
+       backups                    = false
+       datacenter                 = (known after apply)
+       delete_protection          = false
+       firewall_ids               = (known after apply)
+       id                         = (known after apply)
+       ignore_remote_firewall_ids = false
+       image                      = "317193188"
+       ipv4_address               = (known after apply)
+       ipv6_address               = (known after apply)
+       ipv6_network               = (known after apply)
+       keep_disk                  = false
+       labels                     = {
+           "cluster"  = "platform"
+           "nodepool" = "control"
+           "role"     = "control-plane"
        }
+       location                   = "fsn1"
+       name                       = "platform-control-1"
+       placement_group_id         = (known after apply)
+       primary_disk_size          = (known after apply)
+       rebuild_protection         = false
+       server_type                = "cx22"
+       shutdown_before_deletion   = true
+       ssh_keys                   = (known after apply)
+       status                     = (known after apply)

+       network {
+           alias_ips   = []
+           ip          = "10.0.64.1"
+           mac_address = (known after apply)
+           network_id  = (known after apply)
        }

+       public_net {
+           ipv4         = (known after apply)
+           ipv4_enabled = true
+           ipv6         = (known after apply)
+           ipv6_enabled = true
        }
    }

  # module.kubernetes.hcloud_server.worker["platform-worker-1"] will be created
+   resource "hcloud_server" "worker" {
+       allow_deprecated_images    = false
+       backup_window              = (known after apply)
+       backups                    = false
+       datacenter                 = (known after apply)
+       delete_protection          = false
+       firewall_ids               = (known after apply)
+       id                         = (known after apply)
+       ignore_remote_firewall_ids = false
+       image                      = "317193188"
+       ipv4_address               = (known after apply)
+       ipv6_address               = (known after apply)
+       ipv6_network               = (known after apply)
+       keep_disk                  = false
+       labels                     = {
+           "cluster"  = "platform"
+           "nodepool" = "worker"
+           "role"     = "worker"
        }
+       location                   = "fsn1"
+       name                       = "platform-worker-1"
+       placement_group_id         = (known after apply)
+       primary_disk_size          = (known after apply)
+       rebuild_protection         = false
+       server_type                = "cpx11"
+       shutdown_before_deletion   = true
+       ssh_keys                   = (known after apply)
+       status                     = (known after apply)

+       network {
+           alias_ips   = []
+           ip          = "10.0.65.1"
+           mac_address = (known after apply)
+           network_id  = (known after apply)
        }

+       public_net {
+           ipv4         = (known after apply)
+           ipv4_enabled = true
+           ipv6         = (known after apply)
+           ipv6_enabled = true
        }
    }

  # module.kubernetes.hcloud_server.worker["platform-worker-2"] will be created
+   resource "hcloud_server" "worker" {
+       allow_deprecated_images    = false
+       backup_window              = (known after apply)
+       backups                    = false
+       datacenter                 = (known after apply)
+       delete_protection          = false
+       firewall_ids               = (known after apply)
+       id                         = (known after apply)
+       ignore_remote_firewall_ids = false
+       image                      = "317193188"
+       ipv4_address               = (known after apply)
+       ipv6_address               = (known after apply)
+       ipv6_network               = (known after apply)
+       keep_disk                  = false
+       labels                     = {
+           "cluster"  = "platform"
+           "nodepool" = "worker"
+           "role"     = "worker"
        }
+       location                   = "fsn1"
+       name                       = "platform-worker-2"
+       placement_group_id         = (known after apply)
+       primary_disk_size          = (known after apply)
+       rebuild_protection         = false
+       server_type                = "cpx11"
+       shutdown_before_deletion   = true
+       ssh_keys                   = (known after apply)
+       status                     = (known after apply)

+       network {
+           alias_ips   = []
+           ip          = "10.0.65.2"
+           mac_address = (known after apply)
+           network_id  = (known after apply)
        }

+       public_net {
+           ipv4         = (known after apply)
+           ipv4_enabled = true
+           ipv6         = (known after apply)
+           ipv6_enabled = true
        }
    }

  # module.kubernetes.hcloud_ssh_key.this will be created
+   resource "hcloud_ssh_key" "this" {
+       fingerprint = (known after apply)
+       id          = (known after apply)
+       labels      = {
+           "cluster" = "platform"
        }
+       name        = "platform-default"
+       public_key  = <<-EOT
            ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIL8fYj1Ffi6l06OcuwWuoltMBiBxICe9cblmoce2SFEv
        EOT
    }

  # module.kubernetes.hcloud_uploaded_certificate.state will be created
+   resource "hcloud_uploaded_certificate" "state" {
+       certificate      = <<-EOT
            -----BEGIN CERTIFICATE-----
            MIIC1zCCAb+gAwIBAgIQbYYF5Jpj0P4xoNMKxoHx6DANBgkqhkiG9w0BAQsFADAT
            MREwDwYDVQQDEwhwbGF0Zm9ybTAgFw0yNTA5MjExOTQ0MzJaGA8yMTI1MDkyMjE5
            NDQzMlowEzERMA8GA1UEAxMIcGxhdGZvcm0wggEiMA0GCSqGSIb3DQEBAQUAA4IB
            DwAwggEKAoIBAQDMq3rbCIHNT4APed9s8/seDoJA0sZVUFZ7Hu7tLOicq2Y2WmUL
            nQr6WHm2/bh3lVqeY+YReb09INR6x63rofEhkfvQf0vt68s/0jlex6pahGUrBMGF
            29qmbpfhIq5QW9JHEcIC78kv0eE15PRpIA7C6gSDupGhEx5+vpOaMqbxAnG0dVxp
            riKUvS4ZBDTIprtHY1qm3MhQ+s3eZt5R4w/9Gkam9WCjYubM3FV1XnIJx3CqzZJE
            XcXmayXRYUTcoTtPkkovoyvEpgcxnsKojThBYX9N9DujwmWKPRryscSuL0/n9BQr
            Wn8eOPpHohmQtzWQ39JYMLzhHUYFOnBvV8CZAgMBAAGjJTAjMBMGA1UdJQQMMAoG
            CCsGAQUFBwMBMAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggEBAMYjsXda
            CmiVAtQ6nOuiEfRpQ93DFnqAGkU2bGynIuaq+Y3hAzUBmDZNi3poWIlme7iN7gjA
            3bYHJbCQkAlxmwCPZtvdcJRauCS9Y/sUbZfROUmh6P4HK+tsVI47a85ngcYNGSbV
            5syzN8jCoxmYr6LNd9+XYaRpsa7Kd0MPERin1MJxhT0yg1gl0f4l1IZ+XFlVO4Dp
            aHjhgwS4D4uUjfnwR0OhsMQffZscar6gPky7hcplFrJSWqgFs+8mfLAIa4cJo31e
            3PnPsm8PO4f3dff9aUiy/7HxrDXLA7w1ygmgWer64PxO0HMiWdsjnjhALb4pkosU
            ZTjRATnl0mG4wB4=
            -----END CERTIFICATE-----
        EOT
+       created          = (known after apply)
+       domain_names     = (known after apply)
+       fingerprint      = (known after apply)
+       id               = (known after apply)
+       labels           = {
+           "cluster" = "platform"
+           "state"   = "initialized"
        }
+       name             = "platform-state"
+       not_valid_after  = (known after apply)
+       not_valid_before = (known after apply)
+       private_key      = (sensitive value)
+       type             = (known after apply)
    }

  # module.kubernetes.talos_cluster_kubeconfig.this will be created
+   resource "talos_cluster_kubeconfig" "this" {
+       certificate_renewal_duration    = "720h"
+       client_configuration            = {
+           ca_certificate     = "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"
+           client_certificate = "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"
+           client_key         = (sensitive value)
        }
+       endpoint                        = (known after apply)
+       id                              = (known after apply)
+       kubeconfig_raw                  = (sensitive value)
+       kubernetes_client_configuration = (known after apply)
+       node                            = (known after apply)
    }

  # module.kubernetes.talos_machine_bootstrap.this will be created
+   resource "talos_machine_bootstrap" "this" {
+       client_configuration = {
+           ca_certificate     = "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"
+           client_certificate = "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUJLVENCM0tBREFnRUNBaEVBL2g2dUF3SjRNd1I4ZndINWlWNGtkVEFGQmdNclpYQXdFREVPTUF3R0ExVUUKQ2hNRmRHRnNiM013SGhjTk1qVXdPVEl4TVRrME5ETXlXaGNOTWpZd09USXhNVGswTkRNeVdqQVRNUkV3RHdZRApWUVFLRXdodmN6cGhaRzFwYmpBcU1BVUdBeXRsY0FNaEFKb0VuVXRzWWpQMjVmTFJBVTJZL0JmWldBL3hXQllwClVmQ3BTczZSTzJtMW8wZ3dSakFPQmdOVkhROEJBZjhFQkFNQ0I0QXdFd1lEVlIwbEJBd3dDZ1lJS3dZQkJRVUgKQXdJd0h3WURWUjBqQkJnd0ZvQVVqUVhHK3htc213bDVhQVR1NnV2bzR0U2JZM0l3QlFZREsyVndBMEVBMkFtKwowWDNSY0NtYllyWjhMOUJ4K3g3ODIrSTltR1dUQ1c4bndUekZOMEtYWHlZVDJWYzFZRWpCVTJiS2tFa0tSK1B6ClFYbHlpd1UwVDM4T3BKZ3FDZz09Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K"
+           client_key         = (sensitive value)
        }
+       endpoint             = (known after apply)
+       id                   = (known after apply)
+       node                 = "10.0.64.1"
    }

  # module.kubernetes.talos_machine_configuration_apply.control_plane["platform-control-1"] will be created
+   resource "talos_machine_configuration_apply" "control_plane" {
+       apply_mode                  = "auto"
+       client_configuration        = {
+           ca_certificate     = "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"
+           client_certificate = "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"
+           client_key         = (sensitive value)
        }
+       endpoint                    = (known after apply)
+       id                          = (known after apply)
+       machine_configuration       = (sensitive value)
+       machine_configuration_input = (sensitive value)
+       node                        = "10.0.64.1"
+       on_destroy                  = {
+           graceful = true
+           reboot   = false
+           reset    = true
        }
    }

  # module.kubernetes.talos_machine_configuration_apply.worker["platform-worker-1"] will be created
+   resource "talos_machine_configuration_apply" "worker" {
+       apply_mode                  = "auto"
+       client_configuration        = {
+           ca_certificate     = "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"
+           client_certificate = "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"
+           client_key         = (sensitive value)
        }
+       endpoint                    = (known after apply)
+       id                          = (known after apply)
+       machine_configuration       = (sensitive value)
+       machine_configuration_input = (sensitive value)
+       node                        = "10.0.65.1"
+       on_destroy                  = {
+           graceful = true
+           reboot   = false
+           reset    = true
        }
    }

  # module.kubernetes.talos_machine_configuration_apply.worker["platform-worker-2"] will be created
+   resource "talos_machine_configuration_apply" "worker" {
+       apply_mode                  = "auto"
+       client_configuration        = {
+           ca_certificate     = "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"
+           client_certificate = "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"
+           client_key         = (sensitive value)
        }
+       endpoint                    = (known after apply)
+       id                          = (known after apply)
+       machine_configuration       = (sensitive value)
+       machine_configuration_input = (sensitive value)
+       node                        = "10.0.65.2"
+       on_destroy                  = {
+           graceful = true
+           reboot   = false
+           reset    = true
        }
    }

  # module.kubernetes.terraform_data.create_kubeconfig[0] will be created
+   resource "terraform_data" "create_kubeconfig" {
+       id               = (known after apply)
+       input            = {
+           cluster_kubeconfig_path = "kubeconfig"
        }
+       output           = (known after apply)
+       triggers_replace = [
+           (sensitive value),
+           "kubeconfig",
        ]
    }

  # module.kubernetes.terraform_data.create_talosconfig[0] will be created
+   resource "terraform_data" "create_talosconfig" {
+       id               = (known after apply)
+       input            = {
+           cluster_talosconfig_path = "talosconfig"
        }
+       output           = (known after apply)
+       triggers_replace = [
+           (sensitive value),
+           "talosconfig",
        ]
    }

  # module.kubernetes.terraform_data.synchronize_manifests will be created
+   resource "terraform_data" "synchronize_manifests" {
+       id               = (known after apply)
+       triggers_replace = [
+           (sensitive value),
+           "v1.10.1",
+           "v0.85.0",
        ]
    }

  # module.kubernetes.terraform_data.talos_health_data will be created
+   resource "terraform_data" "talos_health_data" {
+       id     = (known after apply)
+       input  = {
+           control_plane_nodes = [
+               "10.0.64.1",
            ]
+           current_ip          = [
+               "172.174.223.103/32",
            ]
+           endpoints           = (known after apply)
+           kube_api_url        = (known after apply)
+           worker_nodes        = [
+               "10.0.65.1",
+               "10.0.65.2",
            ]
        }
+       output = (known after apply)
    }

  # module.kubernetes.terraform_data.upgrade_control_plane will be created
+   resource "terraform_data" "upgrade_control_plane" {
+       id               = (known after apply)
+       triggers_replace = [
+           "v1.11.1",
+           "ce4c980550dd2ab1b17bbf2b08801c7eb59418eafe8f279833297925d67c7515",
        ]
    }

  # module.kubernetes.terraform_data.upgrade_kubernetes will be created
+   resource "terraform_data" "upgrade_kubernetes" {
+       id               = (known after apply)
+       triggers_replace = [
+           "v1.33.4",
        ]
    }

  # module.kubernetes.terraform_data.upgrade_worker will be created
+   resource "terraform_data" "upgrade_worker" {
+       id               = (known after apply)
+       triggers_replace = [
+           "v1.11.1",
+           "ce4c980550dd2ab1b17bbf2b08801c7eb59418eafe8f279833297925d67c7515",
        ]
    }

Plan: 27 to add, 0 to change, 0 to destroy.

📝 Plan generated in Create Terraform plan #8

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

enhancement New feature or request

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants