-
Notifications
You must be signed in to change notification settings - Fork 6
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Update demo.tfvars #660
Merged
Merged
Update demo.tfvars #660
Conversation
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
thomast1906
approved these changes
Dec 19, 2024
Plan Result (Genesis_sbox - Genesis)
|
Plan Result (Network_sbox - NetworkRg)
|
Plan Result (Network_sbox - DeployInfrastructure)
|
Plan Result (Managed_Identity_sbox - Managed_Identity)
Change Result (Click me) # azurerm_resource_group.application-mi will be updated in-place
~ resource "azurerm_resource_group" "application-mi" {
id = "/subscriptions/a8140a9e-f1b0-481f-a4de-09e2ee23f7ab/resourceGroups/managed-identities-sbox-rg"
name = "managed-identities-sbox-rg"
~ tags = {
+ "application" = "core"
+ "builtFrom" = "hmcts/aks-sds-deploy"
+ "businessArea" = "Cross-Cutting"
+ "criticality" = "Low"
+ "environment" = "sandbox"
+ "expiresAfter" = "3000-01-01"
+ "startupMode" = "always"
}
# (2 unchanged attributes hidden)
}
Plan: 0 to add, 1 to change, 0 to destroy.
|
Plan Result (Aks_sbox - DeployInfrastructure)
Change Result (Click me) # azapi_resource.managedCluster[0] will be updated in-place
~ resource "azapi_resource" "managedCluster" {
id = "/subscriptions/a8140a9e-f1b0-481f-a4de-09e2ee23f7ab/resourceGroups/ss-sbox-01-rg/providers/Microsoft.ContainerService/managedClusters/ss-sbox-01-aks"
name = "ss-sbox-01-aks"
~ output = jsonencode({}) -> (known after apply)
- tags = {
- "application" = "core"
- "builtFrom" = "hmcts/aks-sds-deploy"
- "businessArea" = "Cross-Cutting"
- "environment" = "sandbox"
- "expiresAfter" = "3000-01-01"
} -> null
# (8 unchanged attributes hidden)
# (1 unchanged block hidden)
}
# azurerm_resource_group.disks_resource_group will be created
+ resource "azurerm_resource_group" "disks_resource_group" {
+ id = (known after apply)
+ location = "uksouth"
+ name = "disks-sbox-rg"
+ tags = {
+ "application" = "core"
+ "autoShutdown" = "true"
+ "builtFrom" = "hmcts/aks-sds-deploy"
+ "businessArea" = "Cross-Cutting"
+ "criticality" = "Low"
+ "environment" = "sandbox"
+ "expiresAfter" = "3000-01-01"
}
}
# azurerm_role_assignment.disk will be created
+ resource "azurerm_role_assignment" "disk" {
+ id = (known after apply)
+ name = (known after apply)
+ principal_id = "ba206872-8722-4375-bf4d-a28c39dff414"
+ principal_type = (known after apply)
+ role_definition_id = (known after apply)
+ role_definition_name = "Virtual Machine Contributor"
+ scope = (known after apply)
+ skip_service_principal_aad_check = (known after apply)
}
Plan: 2 to add, 1 to change, 0 to destroy. ℹ️ Objects have changed outside of TerraformThis feature was introduced from Terraform v0.15.4. Terraform detected the following changes made outside of Terraform since the
last "terraform apply" which may have affected this plan:
# azurerm_resource_group.disks_resource_group has been deleted
- resource "azurerm_resource_group" "disks_resource_group" {
- id = "/subscriptions/a8140a9e-f1b0-481f-a4de-09e2ee23f7ab/resourceGroups/disks-sbox-rg" -> null
name = "disks-sbox-rg"
tags = {
"application" = "core"
"autoShutdown" = "true"
"builtFrom" = "hmcts/aks-sds-deploy"
"businessArea" = "Cross-Cutting"
"criticality" = "Low"
"environment" = "sandbox"
"expiresAfter" = "3000-01-01"
}
# (2 unchanged attributes hidden)
}
Unless you have made equivalent changes to your configuration, or ignored the |
Plan Result (Genesis_test - Genesis)
|
Plan Result (Genesis_stg - Genesis)
|
Plan Result (Genesis_ptlsbox - Genesis)
|
Plan Result (Genesis_ithc - Genesis)
|
Plan Result (Genesis_dev - Genesis)
|
Plan Result (Genesis_demo - Genesis)
|
Plan Result (Network_ptlsbox - NetworkRg)
|
Plan Result (Aks_test - DeployInfrastructure)
Change Result (Click me) # azurerm_resource_group.disks_resource_group will be created
+ resource "azurerm_resource_group" "disks_resource_group" {
+ id = (known after apply)
+ location = "uksouth"
+ name = "disks-test-rg"
+ tags = {
+ "application" = "core"
+ "autoShutdown" = "true"
+ "builtFrom" = "hmcts/aks-sds-deploy"
+ "businessArea" = "Cross-Cutting"
+ "criticality" = "Medium"
+ "environment" = "testing"
}
}
# azurerm_role_assignment.disk will be created
+ resource "azurerm_role_assignment" "disk" {
+ id = (known after apply)
+ name = (known after apply)
+ principal_id = "b24bca5d-656e-4285-85a9-f69dd718a17e"
+ principal_type = (known after apply)
+ role_definition_id = (known after apply)
+ role_definition_name = "Virtual Machine Contributor"
+ scope = (known after apply)
+ skip_service_principal_aad_check = (known after apply)
}
# module.kubernetes["00"].azurerm_kubernetes_cluster.kubernetes_cluster will be updated in-place
~ resource "azurerm_kubernetes_cluster" "kubernetes_cluster" {
id = "/subscriptions/3eec5bde-7feb-4566-bfb6-805df6e10b90/resourceGroups/ss-test-00-rg/providers/Microsoft.ContainerService/managedClusters/ss-test-00-aks"
name = "ss-test-00-aks"
tags = {
"application" = "core"
"autoShutdown" = "true"
"builtFrom" = "hmcts/aks-sds-deploy"
"businessArea" = "Cross-Cutting"
"criticality" = "Medium"
"environment" = "testing"
}
# (37 unchanged attributes hidden)
- monitor_metrics {
# (2 unchanged attributes hidden)
}
~ oms_agent {
+ log_analytics_workspace_id = "/subscriptions/1c4f0704-a29e-403d-b719-b90c34ef14c9/resourceGroups/oms-automation/providers/Microsoft.OperationalInsights/workspaces/hmcts-nonprod"
- msi_auth_for_monitoring_enabled = true -> null
# (1 unchanged attribute hidden)
}
# (10 unchanged blocks hidden)
}
Plan: 2 to add, 1 to change, 0 to destroy. ℹ️ Objects have changed outside of TerraformThis feature was introduced from Terraform v0.15.4. Terraform detected the following changes made outside of Terraform since the
last "terraform apply" which may have affected this plan:
# azurerm_resource_group.disks_resource_group has been deleted
- resource "azurerm_resource_group" "disks_resource_group" {
- id = "/subscriptions/3eec5bde-7feb-4566-bfb6-805df6e10b90/resourceGroups/disks-test-rg" -> null
name = "disks-test-rg"
tags = {
"application" = "core"
"autoShutdown" = "true"
"builtFrom" = "hmcts/aks-sds-deploy"
"businessArea" = "Cross-Cutting"
"criticality" = "Medium"
"environment" = "testing"
}
# (2 unchanged attributes hidden)
}
Unless you have made equivalent changes to your configuration, or ignored the |
Plan Result (Aks_dev - DeployInfrastructure)
Change Result (Click me) # azurerm_resource_group.disks_resource_group will be created
+ resource "azurerm_resource_group" "disks_resource_group" {
+ id = (known after apply)
+ location = "uksouth"
+ name = "disks-dev-rg"
+ tags = {
+ "application" = "core"
+ "autoShutdown" = "true"
+ "builtFrom" = "hmcts/aks-sds-deploy"
+ "businessArea" = "Cross-Cutting"
+ "criticality" = "Low"
+ "environment" = "development"
}
}
# azurerm_role_assignment.disk will be created
+ resource "azurerm_role_assignment" "disk" {
+ id = (known after apply)
+ name = (known after apply)
+ principal_id = "6c5fded7-1350-4d99-b404-8f57d0025643"
+ principal_type = (known after apply)
+ role_definition_id = (known after apply)
+ role_definition_name = "Virtual Machine Contributor"
+ scope = (known after apply)
+ skip_service_principal_aad_check = (known after apply)
}
Plan: 2 to add, 0 to change, 0 to destroy. ℹ️ Objects have changed outside of TerraformThis feature was introduced from Terraform v0.15.4. Terraform detected the following changes made outside of Terraform since the
last "terraform apply" which may have affected this plan:
# azurerm_resource_group.disks_resource_group has been deleted
- resource "azurerm_resource_group" "disks_resource_group" {
- id = "/subscriptions/867a878b-cb68-4de5-9741-361ac9e178b6/resourceGroups/disks-dev-rg" -> null
name = "disks-dev-rg"
tags = {
"application" = "core"
"autoShutdown" = "true"
"builtFrom" = "hmcts/aks-sds-deploy"
"businessArea" = "Cross-Cutting"
"criticality" = "Low"
"environment" = "development"
}
# (2 unchanged attributes hidden)
}
Unless you have made equivalent changes to your configuration, or ignored the |
Plan Result (Aks_demo - DeployInfrastructure)
Change Result (Click me) # azurerm_resource_group.disks_resource_group will be created
+ resource "azurerm_resource_group" "disks_resource_group" {
+ id = (known after apply)
+ location = "uksouth"
+ name = "disks-demo-rg"
+ tags = {
+ "application" = "core"
+ "autoShutdown" = "true"
+ "builtFrom" = "hmcts/aks-sds-deploy"
+ "businessArea" = "Cross-Cutting"
+ "criticality" = "Medium"
+ "environment" = "demo"
}
}
# azurerm_role_assignment.disk will be created
+ resource "azurerm_role_assignment" "disk" {
+ id = (known after apply)
+ name = (known after apply)
+ principal_id = "da1811ab-7eb9-4dbb-92eb-ad0e2e475ffe"
+ principal_type = (known after apply)
+ role_definition_id = (known after apply)
+ role_definition_name = "Virtual Machine Contributor"
+ scope = (known after apply)
+ skip_service_principal_aad_check = (known after apply)
}
# module.kubernetes["00"].azurerm_kubernetes_cluster_node_pool.additional_node_pools["linux"] will be updated in-place
~ resource "azurerm_kubernetes_cluster_node_pool" "additional_node_pools" {
id = "/subscriptions/c68a4bed-4c3d-4956-af51-4ae164c1957c/resourceGroups/ss-demo-00-rg/providers/Microsoft.ContainerService/managedClusters/ss-demo-00-aks/agentPools/linux"
~ max_count = 10 -> 30
name = "linux"
tags = {
"application" = "core"
"autoShutdown" = "true"
"builtFrom" = "hmcts/aks-sds-deploy"
"businessArea" = "Cross-Cutting"
"criticality" = "Medium"
"environment" = "demo"
}
# (30 unchanged attributes hidden)
# (2 unchanged blocks hidden)
}
# module.kubernetes["01"].azurerm_kubernetes_cluster_node_pool.additional_node_pools["linux"] will be updated in-place
~ resource "azurerm_kubernetes_cluster_node_pool" "additional_node_pools" {
id = "/subscriptions/c68a4bed-4c3d-4956-af51-4ae164c1957c/resourceGroups/ss-demo-01-rg/providers/Microsoft.ContainerService/managedClusters/ss-demo-01-aks/agentPools/linux"
~ max_count = 10 -> 30
name = "linux"
tags = {
"application" = "core"
"autoShutdown" = "true"
"builtFrom" = "hmcts/aks-sds-deploy"
"businessArea" = "Cross-Cutting"
"criticality" = "Medium"
"environment" = "demo"
}
# (30 unchanged attributes hidden)
# (2 unchanged blocks hidden)
}
Plan: 2 to add, 2 to change, 0 to destroy. ℹ️ Objects have changed outside of TerraformThis feature was introduced from Terraform v0.15.4. Terraform detected the following changes made outside of Terraform since the
last "terraform apply" which may have affected this plan:
# azurerm_resource_group.disks_resource_group has been deleted
- resource "azurerm_resource_group" "disks_resource_group" {
- id = "/subscriptions/c68a4bed-4c3d-4956-af51-4ae164c1957c/resourceGroups/disks-demo-rg" -> null
name = "disks-demo-rg"
tags = {
"application" = "core"
"autoShutdown" = "true"
"builtFrom" = "hmcts/aks-sds-deploy"
"businessArea" = "Cross-Cutting"
"criticality" = "Medium"
"environment" = "demo"
}
# (2 unchanged attributes hidden)
}
Unless you have made equivalent changes to your configuration, or ignored the |
Plan Result (Aks_stg - DeployInfrastructure)
Change Result (Click me) # module.kubernetes["00"].azurerm_monitor_diagnostic_setting.kubernetes_cluster_diagnostic_setting[0] will be updated in-place
~ resource "azurerm_monitor_diagnostic_setting" "kubernetes_cluster_diagnostic_setting" {
id = "/subscriptions/74dacd4f-a248-45bb-a2f0-af700dc4cf68/resourceGroups/ss-stg-00-rg/providers/Microsoft.ContainerService/managedClusters/ss-stg-00-aks|DiagLogAnalytics"
name = "DiagLogAnalytics"
# (5 unchanged attributes hidden)
- metric {
- category = "AllMetrics" -> null
- enabled = false -> null
- retention_policy {
- days = 0 -> null
- enabled = false -> null
}
}
# (5 unchanged blocks hidden)
}
# module.kubernetes["01"].azurerm_monitor_diagnostic_setting.kubernetes_cluster_diagnostic_setting[0] will be updated in-place
~ resource "azurerm_monitor_diagnostic_setting" "kubernetes_cluster_diagnostic_setting" {
id = "/subscriptions/74dacd4f-a248-45bb-a2f0-af700dc4cf68/resourceGroups/ss-stg-01-rg/providers/Microsoft.ContainerService/managedClusters/ss-stg-01-aks|DiagLogAnalytics"
name = "DiagLogAnalytics"
# (5 unchanged attributes hidden)
- metric {
- category = "AllMetrics" -> null
- enabled = false -> null
- retention_policy {
- days = 0 -> null
- enabled = false -> null
}
}
# (5 unchanged blocks hidden)
}
Plan: 0 to add, 2 to change, 0 to destroy. |
Plan Result (Aks_ithc - DeployInfrastructure)
Change Result (Click me) # azurerm_resource_group.disks_resource_group will be created
+ resource "azurerm_resource_group" "disks_resource_group" {
+ id = (known after apply)
+ location = "uksouth"
+ name = "disks-ithc-rg"
+ tags = {
+ "application" = "core"
+ "autoShutdown" = "true"
+ "builtFrom" = "hmcts/aks-sds-deploy"
+ "businessArea" = "Cross-Cutting"
+ "criticality" = "Medium"
+ "environment" = "ithc"
}
}
# azurerm_role_assignment.disk will be created
+ resource "azurerm_role_assignment" "disk" {
+ id = (known after apply)
+ name = (known after apply)
+ principal_id = "6cc10170-e033-4e13-ba3c-0d3fff52d182"
+ principal_type = (known after apply)
+ role_definition_id = (known after apply)
+ role_definition_name = "Virtual Machine Contributor"
+ scope = (known after apply)
+ skip_service_principal_aad_check = (known after apply)
}
Plan: 2 to add, 0 to change, 0 to destroy. ℹ️ Objects have changed outside of TerraformThis feature was introduced from Terraform v0.15.4. Terraform detected the following changes made outside of Terraform since the
last "terraform apply" which may have affected this plan:
# azurerm_resource_group.disks_resource_group has been deleted
- resource "azurerm_resource_group" "disks_resource_group" {
- id = "/subscriptions/ba71a911-e0d6-4776-a1a6-079af1df7139/resourceGroups/disks-ithc-rg" -> null
name = "disks-ithc-rg"
tags = {
"application" = "core"
"autoShutdown" = "true"
"builtFrom" = "hmcts/aks-sds-deploy"
"businessArea" = "Cross-Cutting"
"criticality" = "Medium"
"environment" = "ithc"
}
# (2 unchanged attributes hidden)
}
Unless you have made equivalent changes to your configuration, or ignored the |
Plan Result (Genesis_ptl - Genesis)
|
Plan Result (Network_ptl - NetworkRg)
|
Plan Result (Genesis_prod - Genesis)
|
Plan Result (Network_ptl - DeployInfrastructure)
|
Plan Result (Network_prod - NetworkRg)
|
Plan Result (Managed_Identity_ptl - Managed_Identity)
Change Result (Click me) # azurerm_resource_group.application-mi will be updated in-place
~ resource "azurerm_resource_group" "application-mi" {
id = "/subscriptions/6c4d2513-a873-41b4-afdd-b05a33206631/resourceGroups/managed-identities-ptl-rg"
name = "managed-identities-ptl-rg"
~ tags = {
+ "application" = "core"
+ "builtFrom" = "hmcts/aks-sds-deploy"
+ "businessArea" = "Cross-Cutting"
+ "criticality" = "High"
+ "environment" = "production"
+ "startupMode" = "always"
}
# (2 unchanged attributes hidden)
}
Plan: 0 to add, 1 to change, 0 to destroy.
|
Plan Result (Network_prod - DeployInfrastructure)
|
Plan Result (Aks_ptl - DeployInfrastructure)
Change Result (Click me) # module.kubernetes["00"].azurerm_kubernetes_cluster.kubernetes_cluster will be updated in-place
~ resource "azurerm_kubernetes_cluster" "kubernetes_cluster" {
id = "/subscriptions/6c4d2513-a873-41b4-afdd-b05a33206631/resourceGroups/ss-ptl-00-rg/providers/Microsoft.ContainerService/managedClusters/ss-ptl-00-aks"
~ kubernetes_version = "1.30.6" -> "1.30"
name = "ss-ptl-00-aks"
tags = {
"application" = "core"
"autoShutdown" = "true"
"builtFrom" = "hmcts/aks-sds-deploy"
"businessArea" = "Cross-Cutting"
"criticality" = "High"
"environment" = "production"
}
# (36 unchanged attributes hidden)
~ default_node_pool {
name = "system"
~ orchestrator_version = "1.30.6" -> "1.30"
tags = {
"application" = "core"
"autoShutdown" = "true"
"builtFrom" = "hmcts/aks-sds-deploy"
"businessArea" = "Cross-Cutting"
"criticality" = "High"
"environment" = "production"
}
# (29 unchanged attributes hidden)
# (1 unchanged block hidden)
}
# (9 unchanged blocks hidden)
}
# module.kubernetes["00"].azurerm_kubernetes_cluster_node_pool.additional_node_pools["cronjob"] will be updated in-place
~ resource "azurerm_kubernetes_cluster_node_pool" "additional_node_pools" {
id = "/subscriptions/6c4d2513-a873-41b4-afdd-b05a33206631/resourceGroups/ss-ptl-00-rg/providers/Microsoft.ContainerService/managedClusters/ss-ptl-00-aks/agentPools/cronjob"
name = "cronjob"
~ orchestrator_version = "1.30.6" -> "1.30"
tags = {
"application" = "core"
"autoShutdown" = "true"
"builtFrom" = "hmcts/aks-sds-deploy"
"businessArea" = "Cross-Cutting"
"criticality" = "High"
"environment" = "production"
}
# (30 unchanged attributes hidden)
# (2 unchanged blocks hidden)
}
# module.kubernetes["00"].azurerm_kubernetes_cluster_node_pool.additional_node_pools["linux"] will be updated in-place
~ resource "azurerm_kubernetes_cluster_node_pool" "additional_node_pools" {
id = "/subscriptions/6c4d2513-a873-41b4-afdd-b05a33206631/resourceGroups/ss-ptl-00-rg/providers/Microsoft.ContainerService/managedClusters/ss-ptl-00-aks/agentPools/linux"
name = "linux"
~ orchestrator_version = "1.30.6" -> "1.30"
tags = {
"application" = "core"
"autoShutdown" = "true"
"builtFrom" = "hmcts/aks-sds-deploy"
"businessArea" = "Cross-Cutting"
"criticality" = "High"
"environment" = "production"
}
# (30 unchanged attributes hidden)
# (2 unchanged blocks hidden)
}
Plan: 0 to add, 3 to change, 0 to destroy. |
Plan Result (Managed_Identity_prod - Managed_Identity)
Change Result (Click me) # azurerm_resource_group.application-mi will be updated in-place
~ resource "azurerm_resource_group" "application-mi" {
id = "/subscriptions/5ca62022-6aa2-4cee-aaa7-e7536c8d566c/resourceGroups/managed-identities-prod-rg"
name = "managed-identities-prod-rg"
~ tags = {
+ "application" = "core"
+ "builtFrom" = "hmcts/aks-sds-deploy"
+ "businessArea" = "Cross-Cutting"
+ "criticality" = "High"
+ "environment" = "production"
+ "startupMode" = "always"
}
# (2 unchanged attributes hidden)
}
Plan: 0 to add, 1 to change, 0 to destroy.
|
Plan Result (Aks_prod - DeployInfrastructure)
Change Result (Click me) # module.kubernetes["00"].azurerm_monitor_diagnostic_setting.kubernetes_cluster_diagnostic_setting[0] will be updated in-place
~ resource "azurerm_monitor_diagnostic_setting" "kubernetes_cluster_diagnostic_setting" {
id = "/subscriptions/5ca62022-6aa2-4cee-aaa7-e7536c8d566c/resourceGroups/ss-prod-00-rg/providers/Microsoft.ContainerService/managedClusters/ss-prod-00-aks|DiagLogAnalytics"
name = "DiagLogAnalytics"
# (5 unchanged attributes hidden)
- metric {
- category = "AllMetrics" -> null
- enabled = false -> null
- retention_policy {
- days = 0 -> null
- enabled = false -> null
}
}
# (5 unchanged blocks hidden)
}
# module.kubernetes["00"].azurerm_monitor_diagnostic_setting.kubernetes_cluster_diagnostic_setting_sa[0] will be updated in-place
~ resource "azurerm_monitor_diagnostic_setting" "kubernetes_cluster_diagnostic_setting_sa" {
id = "/subscriptions/5ca62022-6aa2-4cee-aaa7-e7536c8d566c/resourceGroups/ss-prod-00-rg/providers/Microsoft.ContainerService/managedClusters/ss-prod-00-aks|aks-storage"
name = "aks-storage"
# (6 unchanged attributes hidden)
- metric {
- category = "AllMetrics" -> null
- enabled = false -> null
- retention_policy {
- days = 0 -> null
- enabled = false -> null
}
}
# (1 unchanged block hidden)
}
# module.kubernetes["01"].azurerm_monitor_diagnostic_setting.kubernetes_cluster_diagnostic_setting[0] will be updated in-place
~ resource "azurerm_monitor_diagnostic_setting" "kubernetes_cluster_diagnostic_setting" {
id = "/subscriptions/5ca62022-6aa2-4cee-aaa7-e7536c8d566c/resourceGroups/ss-prod-01-rg/providers/Microsoft.ContainerService/managedClusters/ss-prod-01-aks|DiagLogAnalytics"
name = "DiagLogAnalytics"
# (5 unchanged attributes hidden)
- metric {
- category = "AllMetrics" -> null
- enabled = false -> null
- retention_policy {
- days = 0 -> null
- enabled = false -> null
}
}
# (5 unchanged blocks hidden)
}
# module.kubernetes["01"].azurerm_monitor_diagnostic_setting.kubernetes_cluster_diagnostic_setting_sa[0] will be updated in-place
~ resource "azurerm_monitor_diagnostic_setting" "kubernetes_cluster_diagnostic_setting_sa" {
id = "/subscriptions/5ca62022-6aa2-4cee-aaa7-e7536c8d566c/resourceGroups/ss-prod-01-rg/providers/Microsoft.ContainerService/managedClusters/ss-prod-01-aks|aks-storage"
name = "aks-storage"
# (6 unchanged attributes hidden)
- metric {
- category = "AllMetrics" -> null
- enabled = false -> null
- retention_policy {
- days = 0 -> null
- enabled = false -> null
}
}
# (1 unchanged block hidden)
}
Plan: 0 to add, 4 to change, 0 to destroy. |
We may revert, but @cakeben currently having scaling issues - this is just a max, |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Labels
Aks_demo - DeployInfrastructure/add-or-update
Aks_dev - DeployInfrastructure/add-or-update
Aks_ithc - DeployInfrastructure/add-or-update
Aks_prod - DeployInfrastructure/add-or-update
Aks_ptl - DeployInfrastructure/add-or-update
Aks_ptlsbox - DeployInfrastructure/add-or-update
Aks_sbox - DeployInfrastructure/add-or-update
Aks_stg - DeployInfrastructure/add-or-update
Aks_test - DeployInfrastructure/add-or-update
Genesis_demo - Genesis/no-changes
Genesis_dev - Genesis/no-changes
Genesis_ithc - Genesis/no-changes
Genesis_prod - Genesis/no-changes
Genesis_ptl - Genesis/no-changes
Genesis_ptlsbox - Genesis/no-changes
Genesis_sbox - Genesis/no-changes
Genesis_stg - Genesis/no-changes
Genesis_test - Genesis/no-changes
Managed_Identity_dev - Managed_Identity/no-changes
Network_demo - DeployInfrastructure/no-changes
Network_demo - NetworkRg/no-changes
Network_dev - DeployInfrastructure/no-changes
Network_dev - NetworkRg/no-changes
Network_ithc - DeployInfrastructure/no-changes
Network_ithc - NetworkRg/no-changes
Network_prod - DeployInfrastructure/no-changes
Network_prod - NetworkRg/no-changes
Network_ptl - DeployInfrastructure/no-changes
Network_ptl - NetworkRg/no-changes
Network_ptlsbox - DeployInfrastructure/no-changes
Network_ptlsbox - NetworkRg/no-changes
Network_sbox - DeployInfrastructure/no-changes
Network_sbox - NetworkRg/no-changes
Network_stg - DeployInfrastructure/no-changes
Network_stg - NetworkRg/no-changes
Network_test - DeployInfrastructure/no-changes
Network_test - NetworkRg/no-changes
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Jira link
See PROJ-XXXXXX
Change description
Testing done
Checklist