-
Notifications
You must be signed in to change notification settings - Fork 0
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feat: namespace def. #67
Conversation
Ran Plan for dir: Show Outputmodule.istio.data.kubernetes_service.istio_ingressgateway: Reading...
module.istio.data.kubernetes_service.istio_ingressgateway: Read complete after 0s [id=istio-system/istio-ingressgateway]
Terraform used the selected providers to generate the following execution
plan. Resource actions are indicated with the following symbols:
+ create
Terraform will perform the following actions:
# module.namespace.kubernetes_namespace.argocd will be created
+ resource "kubernetes_namespace" "argocd" {
+ id = (known after apply)
+ wait_for_default_service_account = false
+ metadata {
+ generation = (known after apply)
+ name = "argocd"
+ resource_version = (known after apply)
+ uid = (known after apply)
}
}
# module.namespace.kubernetes_namespace.cert_manager will be created
+ resource "kubernetes_namespace" "cert_manager" {
+ id = (known after apply)
+ wait_for_default_service_account = false
+ metadata {
+ generation = (known after apply)
+ name = "cert-manager"
+ resource_version = (known after apply)
+ uid = (known after apply)
}
}
# module.namespace.kubernetes_namespace.harbor will be created
+ resource "kubernetes_namespace" "harbor" {
+ id = (known after apply)
+ wait_for_default_service_account = false
+ metadata {
+ generation = (known after apply)
+ name = "harbor"
+ resource_version = (known after apply)
+ uid = (known after apply)
}
}
Plan: 3 to add, 0 to change, 0 to destroy.
|
terraform apply |
Did you mean to use |
atlantis apply |
Ran Apply for dir: Apply Error Show Output
|
atlantis plan |
Ran Plan for dir: Show Outputmodule.istio.data.kubernetes_service.istio_ingressgateway: Reading...
module.istio.data.kubernetes_service.istio_ingressgateway: Read complete after 0s [id=istio-system/istio-ingressgateway]
Terraform used the selected providers to generate the following execution
plan. Resource actions are indicated with the following symbols:
~ update in-place
Terraform will perform the following actions:
# module.namespace.kubernetes_namespace.harbor will be updated in-place
~ resource "kubernetes_namespace" "harbor" {
id = "harbor"
+ wait_for_default_service_account = false
~ metadata {
~ labels = {
- "name" = "harbor" -> null
}
name = "harbor"
# (5 unchanged attributes hidden)
}
}
Plan: 0 to add, 1 to change, 0 to destroy.
|
Ran Plan for dir: Show Outputmodule.istio.data.kubernetes_service.istio_ingressgateway: Reading...
module.istio.data.kubernetes_service.istio_ingressgateway: Read complete after 0s [id=istio-system/istio-ingressgateway]
Terraform used the selected providers to generate the following execution
plan. Resource actions are indicated with the following symbols:
~ update in-place
Terraform will perform the following actions:
# module.namespace.kubernetes_namespace.argocd will be updated in-place
~ resource "kubernetes_namespace" "argocd" {
id = "argocd"
# (1 unchanged attribute hidden)
~ metadata {
~ labels = {
+ "name" = "argocd"
}
name = "argocd"
# (5 unchanged attributes hidden)
}
}
# module.namespace.kubernetes_namespace.cert_manager will be updated in-place
~ resource "kubernetes_namespace" "cert_manager" {
id = "cert-manager"
# (1 unchanged attribute hidden)
~ metadata {
~ labels = {
+ "name" = "cert-manager"
}
name = "cert-manager"
# (5 unchanged attributes hidden)
}
}
Plan: 0 to add, 2 to change, 0 to destroy.
|
Locks and plans deleted for the projects and workspaces modified in this pull request:
|
Ran Plan for dir: Plan Error Show Output
|
No description provided.