Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Moving the change from dev to prod #54

Merged
merged 2 commits into from
May 2, 2024
Merged

Moving the change from dev to prod #54

merged 2 commits into from
May 2, 2024

Conversation

migara
Copy link
Owner

@migara migara commented May 2, 2024

No description provided.

Copy link
Contributor

github-actions bot commented May 2, 2024

Terraform Format and Style 🖌``

Terraform Initialization ⚙️success

Terraform Plan 📖success

Show Plan
panos_panorama_device_group.this: Refreshing state... [id=production]
panos_panorama_template.this: Refreshing state... [id=production TPL]
panos_antivirus_security_profile.example: Refreshing state... [id=production:av]
panos_panorama_template_stack.this: Refreshing state... [id=production TPL STK]
panos_panorama_virtual_router.this: Refreshing state... [id=production TPL:::vr]
panos_panorama_security_rule_group.this: Refreshing state... [id=production:pre-rulebase:vsys1:0::YWxsb3cgZG5zIGZyb20gYXBwcw==]
panos_panorama_static_route_ipv4.this["default"]: Refreshing state... [id=production TPL::vr:default]
panos_panorama_static_route_ipv4.this["on-prem"]: Refreshing state... [id=production TPL::vr:on-prem]

Terraform used the selected providers to generate the following execution
plan. Resource actions are indicated with the following symbols:
  ~ update in-place

Terraform will perform the following actions:

  # panos_panorama_security_rule_group.this will be updated in-place
  ~ resource "panos_panorama_security_rule_group" "this" {
        id                 = "production:pre-rulebase:vsys1:0::YWxsb3cgZG5zIGZyb20gYXBwcw=="
        # (5 unchanged attributes hidden)

      ~ rule {
          ~ hip_profiles                       = [
              + "any",
            ]
            name                               = "allow dns from apps"
            tags                               = []
            # (34 unchanged attributes hidden)
        }
      + rule {
          + action                = "allow"
          + applications          = [
              + "ssl",
              + "web-browsing",
            ]
          + categories            = [
              + "any",
            ]
          + destination_addresses = [
              + "any",
            ]
          + destination_zones     = [
              + "untrust",
            ]
          + hip_profiles          = [
              + "any",
            ]
          + log_end               = true
          + name                  = "allow internet from bizdev x"
          + services              = [
              + "application-default",
            ]
          + source_addresses      = [
              + "192.168.11.0/24",
            ]
          + source_users          = [
              + "any",
            ]
          + source_zones          = [
              + "bizdev",
            ]
          + type                  = "universal"
          + virus                 = "av"
        }
    }

Plan: 0 to add, 1 to change, 0 to destroy.

─────────────────────────────────────────────────────────────────────────────

Note: You didn't use the -out option to save this plan, so Terraform can't
guarantee to take exactly these actions if you run "terraform apply" now.

Pusher: @migara, Action: pull_request

Copy link
Contributor

github-actions bot commented May 2, 2024

Validation Checks Passed ✅

Pusher: @migara, Action: pull_request

@migara migara merged commit 4818c4e into production May 2, 2024
3 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant