Skip to content

Conversation

@marvinbuss
Copy link
Contributor

Proposed changes:

  • Add Ingestion Resources

@marvinbuss marvinbuss added the enhancement New feature or request label Oct 31, 2024
@marvinbuss marvinbuss self-assigned this Oct 31, 2024
@github-actions
Copy link

Terraform Lint Results

  • Terraform Version 📎1.9.8
  • Working Directory 📂./code/infra
  • Terraform Format and Style 🖌success

@github-actions
Copy link

Terraform Lint Results

  • Terraform Version 📎1.9.8
  • Working Directory 📂./code/infra
  • Terraform Format and Style 🖌success

@github-actions
Copy link

Terraform Lint Results

  • Terraform Version 📎1.9.8
  • Working Directory 📂./code/infra
  • Terraform Format and Style 🖌success

@github-actions
Copy link

Terraform Validation & Plan Results

  • Terraform Version 📎1.9.8
  • Working Directory 📂./code/infra
  • Terraform Initialization ⚙️success
  • Terraform Validation 🤖success
  • Terraform Plan 📖success
Show Plan

terraform
Acquiring state lock. This may take a few moments...
�[0m�[1mdata.local_file.file_system_prompt: Reading...�[0m�[0m
�[0m�[1mdata.local_file.file_system_prompt: Read complete after 0s [id=1b64caca607e392bc85ff27243e6022401cc3184]�[0m
�[0m�[1mdata.azurerm_log_analytics_workspace.log_analytics_workspace: Reading...�[0m�[0m
�[0m�[1mmodule.key_vault_consumption.data.azurerm_client_config.current: Reading...�[0m�[0m
�[0m�[1mmodule.storage_account.data.azurerm_client_config.current: Reading...�[0m�[0m
�[0m�[1mmodule.key_vault_ingestion.data.azurerm_client_config.current: Reading...�[0m�[0m
�[0m�[1mmodule.data_factory.data.azurerm_subscription.current: Reading...�[0m�[0m
�[0m�[1mdata.azurerm_client_config.current: Reading...�[0m�[0m
�[0m�[1mmodule.storage_account.data.azurerm_client_config.current: Read complete after 0s [id=Y2xpZW50Q29uZmlncy9jbGllbnRJZD1lNWRmNjg0My1lYmRlLTRkNzktOWM3ZS03NDMxYTNjZDQzZDI7b2JqZWN0SWQ9OTczZGYyYWQtNGU1ZS00ZThiLTlkZjYtMTdmNjFlOWVmZDU1O3N1YnNjcmlwdGlvbklkPTFmZGFiMTE4LTE2MzgtNDE5YS04YjEyLTA2Yzk1NDM3MTRhMDt0ZW5hbnRJZD0zNzk2M2RkNC1mNGU2LTQwZjgtYTdkNi0yNGI5NzkxOWU0NTI=]�[0m
�[0m�[1mdata.azurerm_route_table.route_table: Reading...�[0m�[0m
�[0m�[1mdata.azurerm_network_security_group.network_security_group: Reading...�[0m�[0m
�[0m�[1mdata.azurerm_virtual_network.virtual_network: Reading...�[0m�[0m
�[0m�[1mdata.azurerm_client_config.current: Read complete after 0s [id=Y2xpZW50Q29uZmlncy9jbGllbnRJZD1lNWRmNjg0My1lYmRlLTRkNzktOWM3ZS03NDMxYTNjZDQzZDI7b2JqZWN0SWQ9OTczZGYyYWQtNGU1ZS00ZThiLTlkZjYtMTdmNjFlOWVmZDU1O3N1YnNjcmlwdGlvbklkPTFmZGFiMTE4LTE2MzgtNDE5YS04YjEyLTA2Yzk1NDM3MTRhMDt0ZW5hbnRJZD0zNzk2M2RkNC1mNGU2LTQwZjgtYTdkNi0yNGI5NzkxOWU0NTI=]�[0m
�[0m�[1mmodule.key_vault_consumption.data.azurerm_client_config.current: Read complete after 0s [id=Y2xpZW50Q29uZmlncy9jbGllbnRJZD1lNWRmNjg0My1lYmRlLTRkNzktOWM3ZS03NDMxYTNjZDQzZDI7b2JqZWN0SWQ9OTczZGYyYWQtNGU1ZS00ZThiLTlkZjYtMTdmNjFlOWVmZDU1O3N1YnNjcmlwdGlvbklkPTFmZGFiMTE4LTE2MzgtNDE5YS04YjEyLTA2Yzk1NDM3MTRhMDt0ZW5hbnRJZD0zNzk2M2RkNC1mNGU2LTQwZjgtYTdkNi0yNGI5NzkxOWU0NTI=]�[0m
�[0m�[1mmodule.key_vault_ingestion.data.azurerm_client_config.current: Read complete after 0s [id=Y2xpZW50Q29uZmlncy9jbGllbnRJZD1lNWRmNjg0My1lYmRlLTRkNzktOWM3ZS03NDMxYTNjZDQzZDI7b2JqZWN0SWQ9OTczZGYyYWQtNGU1ZS00ZThiLTlkZjYtMTdmNjFlOWVmZDU1O3N1YnNjcmlwdGlvbklkPTFmZGFiMTE4LTE2MzgtNDE5YS04YjEyLTA2Yzk1NDM3MTRhMDt0ZW5hbnRJZD0zNzk2M2RkNC1mNGU2LTQwZjgtYTdkNi0yNGI5NzkxOWU0NTI=]�[0m
�[0m�[1mmodule.azure_open_ai.data.azurerm_client_config.current: Reading...�[0m�[0m
�[0m�[1mmodule.azure_open_ai.data.azurerm_client_config.current: Read complete after 0s [id=Y2xpZW50Q29uZmlncy9jbGllbnRJZD1lNWRmNjg0My1lYmRlLTRkNzktOWM3ZS03NDMxYTNjZDQzZDI7b2JqZWN0SWQ9OTczZGYyYWQtNGU1ZS00ZThiLTlkZjYtMTdmNjFlOWVmZDU1O3N1YnNjcmlwdGlvbklkPTFmZGFiMTE4LTE2MzgtNDE5YS04YjEyLTA2Yzk1NDM3MTRhMDt0ZW5hbnRJZD0zNzk2M2RkNC1mNGU2LTQwZjgtYTdkNi0yNGI5NzkxOWU0NTI=]�[0m
�[0m�[1mdata.azurerm_log_analytics_workspace.log_analytics_workspace: Read complete after 0s [id=/subscriptions/e82c5267-9dc4-4f45-ac13-abdd5e130d27/resourceGroups/ptt-dev-logging-rg/providers/Microsoft.OperationalInsights/workspaces/ptt-dev-log001]�[0m
�[0m�[1mmodule.data_factory.data.azurerm_subscription.current: Read complete after 0s [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0]�[0m
�[0m�[1mdata.azurerm_route_table.route_table: Read complete after 0s [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/ptt-dev-networking-rg/providers/Microsoft.Network/routeTables/ptt-dev-default-rt001]�[0m
�[0m�[1mdata.azurerm_network_security_group.network_security_group: Read complete after 1s [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/ptt-dev-networking-rg/providers/Microsoft.Network/networkSecurityGroups/ptt-dev-default-nsg001]�[0m
�[0m�[1mdata.azurerm_virtual_network.virtual_network: Read complete after 1s [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/ptt-dev-networking-rg/providers/Microsoft.Network/virtualNetworks/spoke-ptt-dev-vnet001]�[0m

Terraform used the selected providers to generate the following execution
plan. Resource actions are indicated with the following symbols:
  �[32m+�[0m create�[0m
 �[36m<=�[0m read (data resources)�[0m

Terraform will perform the following actions:

�[1m  # data.azurerm_monitor_diagnostic_categories.diagnostic_categories_linux_web_app�[0m will be read during apply
  # (config refers to values not yet known)
�[0m �[36m<=�[0m�[0m data "azurerm_monitor_diagnostic_categories" "diagnostic_categories_linux_web_app" {
      �[32m+�[0m�[0m id                  = (known after apply)
      �[32m+�[0m�[0m log_category_groups = (known after apply)
      �[32m+�[0m�[0m log_category_types  = (known after apply)
      �[32m+�[0m�[0m metrics             = (known after apply)
      �[32m+�[0m�[0m resource_id         = (known after apply)
    }

�[1m  # azapi_resource.subnet_private_endpoints�[0m will be created
�[0m  �[32m+�[0m�[0m resource "azapi_resource" "subnet_private_endpoints" {
      �[32m+�[0m�[0m body                      = {
          �[32m+�[0m�[0m properties = {
              �[32m+�[0m�[0m addressPrefix                     = "10.3.2.0/26"
              �[32m+�[0m�[0m delegations                       = []
              �[32m+�[0m�[0m ipAllocations                     = []
              �[32m+�[0m�[0m networkSecurityGroup              = {
                  �[32m+�[0m�[0m id = "/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/ptt-dev-networking-rg/providers/Microsoft.Network/networkSecurityGroups/ptt-dev-default-nsg001"
                }
              �[32m+�[0m�[0m privateEndpointNetworkPolicies    = "Enabled"
              �[32m+�[0m�[0m privateLinkServiceNetworkPolicies = "Enabled"
              �[32m+�[0m�[0m routeTable                        = {
                  �[32m+�[0m�[0m id = "/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/ptt-dev-networking-rg/providers/Microsoft.Network/routeTables/ptt-dev-default-rt001"
                }
              �[32m+�[0m�[0m serviceEndpointPolicies           = []
              �[32m+�[0m�[0m serviceEndpoints                  = []
            }
        }
      �[32m+�[0m�[0m id                        = (known after apply)
      �[32m+�[0m�[0m ignore_casing             = false
      �[32m+�[0m�[0m ignore_missing_property   = true
      �[32m+�[0m�[0m name                      = "PrivateEndpointSubnetBot"
      �[32m+�[0m�[0m output                    = (known after apply)
      �[32m+�[0m�[0m parent_id                 = "/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/ptt-dev-networking-rg/providers/Microsoft.Network/virtualNetworks/spoke-ptt-dev-vnet001"
      �[32m+�[0m�[0m schema_validation_enabled = true
      �[32m+�[0m�[0m type                      = "Microsoft.Network/virtualNetworks/subnets@2022-07-01"
    }

�[1m  # azapi_resource.subnet_web_app�[0m will be created
�[0m  �[32m+�[0m�[0m resource "azapi_resource" "subnet_web_app" {
      �[32m+�[0m�[0m body                      = {
          �[32m+�[0m�[0m properties = {
              �[32m+�[0m�[0m addressPrefix                     = "10.3.1.192/26"
              �[32m+�[0m�[0m delegations                       = [
                  �[32m+�[0m�[0m {
                      �[32m+�[0m�[0m name       = "WebAppDelegation"
                      �[32m+�[0m�[0m properties = {
                          �[32m+�[0m�[0m serviceName = "Microsoft.Web/serverfarms"
                        }
                    },
                ]
              �[32m+�[0m�[0m ipAllocations                     = []
              �[32m+�[0m�[0m networkSecurityGroup              = {
                  �[32m+�[0m�[0m id = "/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/ptt-dev-networking-rg/providers/Microsoft.Network/networkSecurityGroups/ptt-dev-default-nsg001"
                }
              �[32m+�[0m�[0m privateEndpointNetworkPolicies    = "Enabled"
              �[32m+�[0m�[0m privateLinkServiceNetworkPolicies = "Enabled"
              �[32m+�[0m�[0m routeTable                        = {
                  �[32m+�[0m�[0m id = "/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/ptt-dev-networking-rg/providers/Microsoft.Network/routeTables/ptt-dev-default-rt001"
                }
              �[32m+�[0m�[0m serviceEndpointPolicies           = []
              �[32m+�[0m�[0m serviceEndpoints                  = []
            }
        }
      �[32m+�[0m�[0m id                        = (known after apply)
      �[32m+�[0m�[0m ignore_casing             = false
      �[32m+�[0m�[0m ignore_missing_property   = true
      �[32m+�[0m�[0m name                      = "WebAppSubnetBot"
      �[32m+�[0m�[0m output                    = (known after apply)
      �[32m+�[0m�[0m parent_id                 = "/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/ptt-dev-networking-rg/providers/Microsoft.Network/virtualNetworks/spoke-ptt-dev-vnet001"
      �[32m+�[0m�[0m schema_validation_enabled = true
      �[32m+�[0m�[0m type                      = "Microsoft.Network/virtualNetworks/subnets@2022-07-01"
    }

�[1m  # azurerm_bot_connection.bot_connection_aadv2_oauth�[0m will be created
�[0m  �[32m+�[0m�[0m resource "azurerm_bot_connection" "bot_connection_aadv2_oauth" {
      �[32m+�[0m�[0m bot_name              = "bfr-dev-bot001"
      �[32m+�[0m�[0m client_id             = (sensitive value)
      �[32m+�[0m�[0m client_secret         = (sensitive value)
      �[32m+�[0m�[0m id                    = (known after apply)
      �[32m+�[0m�[0m location              = "global"
      �[32m+�[0m�[0m name                  = "aadv2-oauth"
      �[32m+�[0m�[0m parameters            = {
          �[32m+�[0m�[0m "tenantId" = "37963dd4-f4e6-40f8-a7d6-24b97919e452"
        }
      �[32m+�[0m�[0m resource_group_name   = "bfr-dev-bot-cnsm-rg"
      �[32m+�[0m�[0m scopes                = "openid profile User.Read User.ReadBasic.All"
      �[32m+�[0m�[0m service_provider_name = "Aadv2"
    }

�[1m  # azurerm_cognitive_deployment.cognitive_deployment_gpt_4o�[0m will be created
�[0m  �[32m+�[0m�[0m resource "azurerm_cognitive_deployment" "cognitive_deployment_gpt_4o" {
      �[32m+�[0m�[0m cognitive_account_id   = (known after apply)
      �[32m+�[0m�[0m id                     = (known after apply)
      �[32m+�[0m�[0m name                   = "gpt-4o"
      �[32m+�[0m�[0m version_upgrade_option = "OnceNewDefaultVersionAvailable"

      �[32m+�[0m�[0m model {
          �[32m+�[0m�[0m format  = "OpenAI"
          �[32m+�[0m�[0m name    = "gpt-4o"
          �[32m+�[0m�[0m version = "2024-08-06"
        }

      �[32m+�[0m�[0m sku {
          �[32m+�[0m�[0m capacity = 75
          �[32m+�[0m�[0m name     = "Standard"
        }
    }

�[1m  # azurerm_cosmosdb_sql_database.cosmosdb_sql_database�[0m will be created
�[0m  �[32m+�[0m�[0m resource "azurerm_cosmosdb_sql_database" "cosmosdb_sql_database" {
      �[32m+�[0m�[0m account_name        = "bfr-dev-cosmos001"
      �[32m+�[0m�[0m id                  = (known after apply)
      �[32m+�[0m�[0m name                = "BotDb"
      �[32m+�[0m�[0m resource_group_name = "bfr-dev-bot-cnsm-rg"
      �[32m+�[0m�[0m throughput          = (known after apply)

      �[32m+�[0m�[0m autoscale_settings {
          �[32m+�[0m�[0m max_throughput = 1000
        }
    }

�[1m  # azurerm_linux_web_app.linux_web_app�[0m will be created
�[0m  �[32m+�[0m�[0m resource "azurerm_linux_web_app" "linux_web_app" {
      �[32m+�[0m�[0m app_settings                                   = (known after apply)
      �[32m+�[0m�[0m client_affinity_enabled                        = false
      �[32m+�[0m�[0m client_certificate_enabled                     = false
      �[32m+�[0m�[0m client_certificate_mode                        = "Required"
      �[32m+�[0m�[0m custom_domain_verification_id                  = (sensitive value)
      �[32m+�[0m�[0m default_hostname                               = (known after apply)
      �[32m+�[0m�[0m enabled                                        = true
      �[32m+�[0m�[0m ftp_publish_basic_authentication_enabled       = false
      �[32m+�[0m�[0m hosting_environment_id                         = (known after apply)
      �[32m+�[0m�[0m https_only                                     = true
      �[32m+�[0m�[0m id                                             = (known after apply)
      �[32m+�[0m�[0m key_vault_reference_identity_id                = (known after apply)
      �[32m+�[0m�[0m kind                                           = (known after apply)
      �[32m+�[0m�[0m location                                       = "northeurope"
      �[32m+�[0m�[0m name                                           = "bfr-dev-app001"
      �[32m+�[0m�[0m outbound_ip_address_list                       = (known after apply)
      �[32m+�[0m�[0m outbound_ip_addresses                          = (known after apply)
      �[32m+�[0m�[0m possible_outbound_ip_address_list              = (known after apply)
      �[32m+�[0m�[0m possible_outbound_ip_addresses                 = (known after apply)
      �[32m+�[0m�[0m public_network_access_enabled                  = true
      �[32m+�[0m�[0m resource_group_name                            = "bfr-dev-bot-cnsm-rg"
      �[32m+�[0m�[0m service_plan_id                                = (known after apply)
      �[32m+�[0m�[0m site_credential                                = (sensitive value)
      �[32m+�[0m�[0m tags                                           = {
          �[32m+�[0m�[0m "workload" = "bot-assistant"
        }
      �[32m+�[0m�[0m virtual_network_subnet_id                      = (known after apply)
      �[32m+�[0m�[0m webdeploy_publish_basic_authentication_enabled = false
      �[32m+�[0m�[0m zip_deploy_file                                = (known after apply)
        �[90m# (1 unchanged attribute hidden)�[0m�[0m

      �[32m+�[0m�[0m identity {
          �[32m+�[0m�[0m identity_ids = (known after apply)
          �[32m+�[0m�[0m principal_id = (known after apply)
          �[32m+�[0m�[0m tenant_id    = (known after apply)
          �[32m+�[0m�[0m type         = "UserAssigned"
        }

      �[32m+�[0m�[0m site_config {
          �[32m+�[0m�[0m always_on                               = true
          �[32m+�[0m�[0m app_command_line                        = "gunicorn --bind 0.0.0.0 --worker-class aiohttp.worker.GunicornWebWorker --timeout 600 app:APP"
          �[32m+�[0m�[0m container_registry_use_managed_identity = false
          �[32m+�[0m�[0m default_documents                       = (known after apply)
          �[32m+�[0m�[0m detailed_error_logging_enabled          = (known after apply)
          �[32m+�[0m�[0m ftps_state                              = "Disabled"
          �[32m+�[0m�[0m http2_enabled                           = true
          �[32m+�[0m�[0m ip_restriction_default_action           = "Allow"
          �[32m+�[0m�[0m linux_fx_version                        = (known after apply)
          �[32m+�[0m�[0m load_balancing_mode                     = "LeastRequests"
          �[32m+�[0m�[0m local_mysql_enabled                     = false
          �[32m+�[0m�[0m managed_pipeline_mode                   = "Integrated"
          �[32m+�[0m�[0m minimum_tls_version                     = "1.2"
          �[32m+�[0m�[0m remote_debugging_enabled                = false
          �[32m+�[0m�[0m remote_debugging_version                = "VS2022"
          �[32m+�[0m�[0m scm_ip_restriction_default_action       = "Allow"
          �[32m+�[0m�[0m scm_minimum_tls_version                 = "1.2"
          �[32m+�[0m�[0m scm_type                                = (known after apply)
          �[32m+�[0m�[0m scm_use_main_ip_restriction             = false
          �[32m+�[0m�[0m use_32_bit_worker                       = false
          �[32m+�[0m�[0m vnet_route_all_enabled                  = true
          �[32m+�[0m�[0m websockets_enabled                      = false
          �[32m+�[0m�[0m worker_count                            = 1

          �[32m+�[0m�[0m application_stack {
              �[32m+�[0m�[0m python_version = "3.11"
            }

          �[32m+�[0m�[0m cors {
              �[32m+�[0m�[0m allowed_origins     = [
                  �[32m+�[0m�[0m "https://botservice.hosting.portal.azure.net",
                  �[32m+�[0m�[0m "https://hosting.onecloud.azure-test.net",
                ]
              �[32m+�[0m�[0m support_credentials = true
            }
        }
    }

�[1m  # azurerm_monitor_diagnostic_setting.diagnostic_setting_linux_web_app�[0m will be created
�[0m  �[32m+�[0m�[0m resource "azurerm_monitor_diagnostic_setting" "diagnostic_setting_linux_web_app" {
      �[32m+�[0m�[0m id                             = (known after apply)
      �[32m+�[0m�[0m log_analytics_destination_type = (known after apply)
      �[32m+�[0m�[0m log_analytics_workspace_id     = "/subscriptions/e82c5267-9dc4-4f45-ac13-abdd5e130d27/resourceGroups/ptt-dev-logging-rg/providers/Microsoft.OperationalInsights/workspaces/ptt-dev-log001"
      �[32m+�[0m�[0m name                           = "logAnalytics"
      �[32m+�[0m�[0m target_resource_id             = (known after apply)

      �[32m+�[0m�[0m enabled_log (known after apply)

      �[32m+�[0m�[0m metric (known after apply)
    }

�[1m  # azurerm_private_endpoint.linux_web_app_private_endpoint�[0m will be created
�[0m  �[32m+�[0m�[0m resource "azurerm_private_endpoint" "linux_web_app_private_endpoint" {
      �[32m+�[0m�[0m custom_dns_configs            = (known after apply)
      �[32m+�[0m�[0m custom_network_interface_name = "bfr-dev-app001-nic"
      �[32m+�[0m�[0m id                            = (known after apply)
      �[32m+�[0m�[0m location                      = "northeurope"
      �[32m+�[0m�[0m name                          = "bfr-dev-app001-pe"
      �[32m+�[0m�[0m network_interface             = (known after apply)
      �[32m+�[0m�[0m private_dns_zone_configs      = (known after apply)
      �[32m+�[0m�[0m resource_group_name           = "bfr-dev-bot-cnsm-rg"
      �[32m+�[0m�[0m subnet_id                     = (known after apply)
      �[32m+�[0m�[0m tags                          = {
          �[32m+�[0m�[0m "workload" = "bot-assistant"
        }

      �[32m+�[0m�[0m private_dns_zone_group {
          �[32m+�[0m�[0m id                   = (known after apply)
          �[32m+�[0m�[0m name                 = "bfr-dev-app001-arecord"
          �[32m+�[0m�[0m private_dns_zone_ids = [
              �[32m+�[0m�[0m "/subscriptions/e82c5267-9dc4-4f45-ac13-abdd5e130d27/resourceGroups/ptt-dev-privatedns-rg/providers/Microsoft.Network/privateDnsZones/privatelink.azurewebsites.net",
            ]
        }

      �[32m+�[0m�[0m private_service_connection {
          �[32m+�[0m�[0m is_manual_connection           = false
          �[32m+�[0m�[0m name                           = "bfr-dev-app001-pe"
          �[32m+�[0m�[0m private_connection_resource_id = (known after apply)
          �[32m+�[0m�[0m private_ip_address             = (known after apply)
          �[32m+�[0m�[0m subresource_names              = [
              �[32m+�[0m�[0m "sites",
            ]
        }
    }

�[1m  # azurerm_resource_group.resource_group_consumption�[0m will be created
�[0m  �[32m+�[0m�[0m resource "azurerm_resource_group" "resource_group_consumption" {
      �[32m+�[0m�[0m id       = (known after apply)
      �[32m+�[0m�[0m location = "northeurope"
      �[32m+�[0m�[0m name     = "bfr-dev-bot-cnsm-rg"
      �[32m+�[0m�[0m tags     = {
          �[32m+�[0m�[0m "workload" = "bot-assistant"
        }
    }

�[1m  # azurerm_resource_group.resource_group_ingestion�[0m will be created
�[0m  �[32m+�[0m�[0m resource "azurerm_resource_group" "resource_group_ingestion" {
      �[32m+�[0m�[0m id       = (known after apply)
      �[32m+�[0m�[0m location = "northeurope"
      �[32m+�[0m�[0m name     = "bfr-dev-bot-ngst-rg"
      �[32m+�[0m�[0m tags     = {
          �[32m+�[0m�[0m "workload" = "bot-assistant"
        }
    }

�[1m  # azurerm_role_assignment.uai_roleassignment_key_vault_secrets_user�[0m will be created
�[0m  �[32m+�[0m�[0m resource "azurerm_role_assignment" "uai_roleassignment_key_vault_secrets_user" {
      �[32m+�[0m�[0m description                      = "Required for accessing secrets in the key vault from teh web app app settings."
      �[32m+�[0m�[0m id                               = (known after apply)
      �[32m+�[0m�[0m name                             = (known after apply)
      �[32m+�[0m�[0m principal_id                     = (known after apply)
      �[32m+�[0m�[0m principal_type                   = "ServicePrincipal"
      �[32m+�[0m�[0m role_definition_id               = (known after apply)
      �[32m+�[0m�[0m role_definition_name             = "Key Vault Secrets User"
      �[32m+�[0m�[0m scope                            = (known after apply)
      �[32m+�[0m�[0m skip_service_principal_aad_check = (known after apply)
    }

�[1m  # azurerm_role_assignment.uai_roleassignment_open_ai_contributor�[0m will be created
�[0m  �[32m+�[0m�[0m resource "azurerm_role_assignment" "uai_roleassignment_open_ai_contributor" {
      �[32m+�[0m�[0m description                      = "Required for accessing azure open ai from the web app."
      �[32m+�[0m�[0m id                               = (known after apply)
      �[32m+�[0m�[0m name                             = (known after apply)
      �[32m+�[0m�[0m principal_id                     = (known after apply)
      �[32m+�[0m�[0m principal_type                   = "ServicePrincipal"
      �[32m+�[0m�[0m role_definition_id               = (known after apply)
      �[32m+�[0m�[0m role_definition_name             = "Cognitive Services OpenAI Contributor"
      �[32m+�[0m�[0m scope                            = (known after apply)
      �[32m+�[0m�[0m skip_service_principal_aad_check = (known after apply)
    }

�[1m  # module.app_service_plan.data.azurerm_monitor_diagnostic_categories.diagnostic_categories_service_plan�[0m will be read during apply
  # (config refers to values not yet known)
�[0m �[36m<=�[0m�[0m data "azurerm_monitor_diagnostic_categories" "diagnostic_categories_service_plan" {
      �[32m+�[0m�[0m id                  = (known after apply)
      �[32m+�[0m�[0m log_category_groups = (known after apply)
      �[32m+�[0m�[0m log_category_types  = (known after apply)
      �[32m+�[0m�[0m metrics             = (known after apply)
      �[32m+�[0m�[0m resource_id         = (known after apply)
    }

�[1m  # module.app_service_plan.azurerm_monitor_diagnostic_setting.diagnostic_setting_service_plan["0"]�[0m will be created
�[0m  �[32m+�[0m�[0m resource "azurerm_monitor_diagnostic_setting" "diagnostic_setting_service_plan" {
      �[32m+�[0m�[0m id                             = (known after apply)
      �[32m+�[0m�[0m log_analytics_destination_type = (known after apply)
      �[32m+�[0m�[0m log_analytics_workspace_id     = "/subscriptions/e82c5267-9dc4-4f45-ac13-abdd5e130d27/resourceGroups/ptt-dev-logging-rg/providers/Microsoft.OperationalInsights/workspaces/ptt-dev-log001"
      �[32m+�[0m�[0m name                           = "applicationLogs-0"
      �[32m+�[0m�[0m target_resource_id             = (known after apply)

      �[32m+�[0m�[0m enabled_log (known after apply)

      �[32m+�[0m�[0m metric (known after apply)
    }

�[1m  # module.app_service_plan.azurerm_service_plan.service_plan�[0m will be created
�[0m  �[32m+�[0m�[0m resource "azurerm_service_plan" "service_plan" {
      �[32m+�[0m�[0m id                           = (known after apply)
      �[32m+�[0m�[0m kind                         = (known after apply)
      �[32m+�[0m�[0m location                     = "northeurope"
      �[32m+�[0m�[0m maximum_elastic_worker_count = (known after apply)
      �[32m+�[0m�[0m name                         = "bfr-dev-asp001"
      �[32m+�[0m�[0m os_type                      = "Linux"
      �[32m+�[0m�[0m per_site_scaling_enabled     = false
      �[32m+�[0m�[0m reserved                     = (known after apply)
      �[32m+�[0m�[0m resource_group_name          = "bfr-dev-bot-cnsm-rg"
      �[32m+�[0m�[0m sku_name                     = "P0v3"
      �[32m+�[0m�[0m tags                         = {
          �[32m+�[0m�[0m "workload" = "bot-assistant"
        }
      �[32m+�[0m�[0m worker_count                 = 1
      �[32m+�[0m�[0m zone_balancing_enabled       = false
    }

�[1m  # module.application_insights.data.azurerm_monitor_diagnostic_categories.diagnostic_categories_application_insights�[0m will be read during apply
  # (config refers to values not yet known)
�[0m �[36m<=�[0m�[0m data "azurerm_monitor_diagnostic_categories" "diagnostic_categories_application_insights" {
      �[32m+�[0m�[0m id                  = (known after apply)
      �[32m+�[0m�[0m log_category_groups = (known after apply)
      �[32m+�[0m�[0m log_category_types  = (known after apply)
      �[32m+�[0m�[0m metrics             = (known after apply)
      �[32m+�[0m�[0m resource_id         = (known after apply)
    }

�[1m  # module.application_insights.azurerm_application_insights.application_insights�[0m will be created
�[0m  �[32m+�[0m�[0m resource "azurerm_application_insights" "application_insights" {
      �[32m+�[0m�[0m app_id                                = (known after apply)
      �[32m+�[0m�[0m application_type                      = "web"
      �[32m+�[0m�[0m connection_string                     = (sensitive value)
      �[32m+�[0m�[0m daily_data_cap_in_gb                  = 100
      �[32m+�[0m�[0m daily_data_cap_notifications_disabled = false
      �[32m+�[0m�[0m disable_ip_masking                    = false
      �[32m+�[0m�[0m force_customer_storage_for_profiler   = false
      �[32m+�[0m�[0m id                                    = (known after apply)
      �[32m+�[0m�[0m instrumentation_key                   = (sensitive value)
      �[32m+�[0m�[0m internet_ingestion_enabled            = true
      �[32m+�[0m�[0m internet_query_enabled                = true
      �[32m+�[0m�[0m local_authentication_disabled         = false
      �[32m+�[0m�[0m location                              = "northeurope"
      �[32m+�[0m�[0m name                                  = "bfr-dev-appi001"
      �[32m+�[0m�[0m resource_group_name                   = "bfr-dev-bot-cnsm-rg"
      �[32m+�[0m�[0m retention_in_days                     = 90
      �[32m+�[0m�[0m sampling_percentage                   = 100
      �[32m+�[0m�[0m tags                                  = {
          �[32m+�[0m�[0m "workload" = "bot-assistant"
        }
      �[32m+�[0m�[0m workspace_id                          = "/subscriptions/e82c5267-9dc4-4f45-ac13-abdd5e130d27/resourceGroups/ptt-dev-logging-rg/providers/Microsoft.OperationalInsights/workspaces/ptt-dev-log001"
    }

�[1m  # module.application_insights.azurerm_monitor_diagnostic_setting.diagnostic_setting_application_insights["0"]�[0m will be created
�[0m  �[32m+�[0m�[0m resource "azurerm_monitor_diagnostic_setting" "diagnostic_setting_application_insights" {
      �[32m+�[0m�[0m id                             = (known after apply)
      �[32m+�[0m�[0m log_analytics_destination_type = (known after apply)
      �[32m+�[0m�[0m log_analytics_workspace_id     = "/subscriptions/e82c5267-9dc4-4f45-ac13-abdd5e130d27/resourceGroups/ptt-dev-logging-rg/providers/Microsoft.OperationalInsights/workspaces/ptt-dev-log001"
      �[32m+�[0m�[0m name                           = "applicationLogs-0"
      �[32m+�[0m�[0m target_resource_id             = (known after apply)

      �[32m+�[0m�[0m enabled_log (known after apply)

      �[32m+�[0m�[0m metric (known after apply)
    }

�[1m  # module.azure_open_ai.data.azurerm_monitor_diagnostic_categories.diagnostic_categories_cognitive_account�[0m will be read during apply
  # (config refers to values not yet known)
�[0m �[36m<=�[0m�[0m data "azurerm_monitor_diagnostic_categories" "diagnostic_categories_cognitive_account" {
      �[32m+�[0m�[0m id                  = (known after apply)
      �[32m+�[0m�[0m log_category_groups = (known after apply)
      �[32m+�[0m�[0m log_category_types  = (known after apply)
      �[32m+�[0m�[0m metrics             = (known after apply)
      �[32m+�[0m�[0m resource_id         = (known after apply)
    }

�[1m  # module.azure_open_ai.azurerm_cognitive_account.cognitive_account�[0m will be created
�[0m  �[32m+�[0m�[0m resource "azurerm_cognitive_account" "cognitive_account" {
      �[32m+�[0m�[0m custom_subdomain_name              = "bfr-dev-aoai001"
      �[32m+�[0m�[0m dynamic_throttling_enabled         = false
      �[32m+�[0m�[0m endpoint                           = (known after apply)
      �[32m+�[0m�[0m fqdns                              = []
      �[32m+�[0m�[0m id                                 = (known after apply)
      �[32m+�[0m�[0m kind                               = "OpenAI"
      �[32m+�[0m�[0m local_auth_enabled                 = false
      �[32m+�[0m�[0m location                           = "swedencentral"
      �[32m+�[0m�[0m name                               = "bfr-dev-aoai001"
      �[32m+�[0m�[0m outbound_network_access_restricted = true
      �[32m+�[0m�[0m primary_access_key                 = (sensitive value)
      �[32m+�[0m�[0m public_network_access_enabled      = false
      �[32m+�[0m�[0m resource_group_name                = "bfr-dev-bot-cnsm-rg"
      �[32m+�[0m�[0m secondary_access_key               = (sensitive value)
      �[32m+�[0m�[0m sku_name                           = "S0"
      �[32m+�[0m�[0m tags                               = {
          �[32m+�[0m�[0m "workload" = "bot-assistant"
        }

      �[32m+�[0m�[0m identity {
          �[32m+�[0m�[0m principal_id = (known after apply)
          �[32m+�[0m�[0m tenant_id    = (known after apply)
          �[32m+�[0m�[0m type         = "SystemAssigned"
        }

      �[32m+�[0m�[0m network_acls {
          �[32m+�[0m�[0m default_action = "Deny"
        }
    }

�[1m  # module.azure_open_ai.azurerm_monitor_diagnostic_setting.diagnostic_setting_cognitive_account["0"]�[0m will be created
�[0m  �[32m+�[0m�[0m resource "azurerm_monitor_diagnostic_setting" "diagnostic_setting_cognitive_account" {
      �[32m+�[0m�[0m id                             = (known after apply)
      �[32m+�[0m�[0m log_analytics_destination_type = (known after apply)
      �[32m+�[0m�[0m log_analytics_workspace_id     = "/subscriptions/e82c5267-9dc4-4f45-ac13-abdd5e130d27/resourceGroups/ptt-dev-logging-rg/providers/Microsoft.OperationalInsights/workspaces/ptt-dev-log001"
      �[32m+�[0m�[0m name                           = "applicationLogs-0"
      �[32m+�[0m�[0m target_resource_id             = (known after apply)

      �[32m+�[0m�[0m enabled_log (known after apply)

      �[32m+�[0m�[0m metric (known after apply)
    }

�[1m  # module.azure_open_ai.azurerm_private_endpoint.private_endpoint_cognitive_account�[0m will be created
�[0m  �[32m+�[0m�[0m resource "azurerm_private_endpoint" "private_endpoint_cognitive_account" {
      �[32m+�[0m�[0m custom_dns_configs            = (known after apply)
      �[32m+�[0m�[0m custom_network_interface_name = "bfr-dev-aoai001-account-nic"
      �[32m+�[0m�[0m id                            = (known after apply)
      �[32m+�[0m�[0m location                      = "northeurope"
      �[32m+�[0m�[0m name                          = "bfr-dev-aoai001-account-pe"
      �[32m+�[0m�[0m network_interface             = (known after apply)
      �[32m+�[0m�[0m private_dns_zone_configs      = (known after apply)
      �[32m+�[0m�[0m resource_group_name           = "bfr-dev-bot-cnsm-rg"
      �[32m+�[0m�[0m subnet_id                     = (known after apply)
      �[32m+�[0m�[0m tags                          = {
          �[32m+�[0m�[0m "workload" = "bot-assistant"
        }

      �[32m+�[0m�[0m private_dns_zone_group {
          �[32m+�[0m�[0m id                   = (known after apply)
          �[32m+�[0m�[0m name                 = "bfr-dev-aoai001-arecord"
          �[32m+�[0m�[0m private_dns_zone_ids = [
              �[32m+�[0m�[0m "/subscriptions/e82c5267-9dc4-4f45-ac13-abdd5e130d27/resourceGroups/ptt-dev-privatedns-rg/providers/Microsoft.Network/privateDnsZones/privatelink.openai.azure.com",
            ]
        }

      �[32m+�[0m�[0m private_service_connection {
          �[32m+�[0m�[0m is_manual_connection           = false
          �[32m+�[0m�[0m name                           = "bfr-dev-aoai001-account-svc"
          �[32m+�[0m�[0m private_connection_resource_id = (known after apply)
          �[32m+�[0m�[0m private_ip_address             = (known after apply)
          �[32m+�[0m�[0m subresource_names              = [
              �[32m+�[0m�[0m "account",
            ]
        }
    }

�[1m  # module.azure_open_ai.time_sleep.sleep_connectivity�[0m will be created
�[0m  �[32m+�[0m�[0m resource "time_sleep" "sleep_connectivity" {
      �[32m+�[0m�[0m create_duration = "0s"
      �[32m+�[0m�[0m id              = (known after apply)
    }

�[1m  # module.bot_service.data.azurerm_application_insights.application_insights�[0m will be read during apply
  # (config refers to values not yet known)
�[0m �[36m<=�[0m�[0m data "azurerm_application_insights" "application_insights" {
      �[32m+�[0m�[0m app_id              = (known after apply)
      �[32m+�[0m�[0m application_type    = (known after apply)
      �[32m+�[0m�[0m connection_string   = (sensitive value)
      �[32m+�[0m�[0m id                  = (known after apply)
      �[32m+�[0m�[0m instrumentation_key = (known after apply)
      �[32m+�[0m�[0m location            = (known after apply)
      �[32m+�[0m�[0m name                = (known after apply)
      �[32m+�[0m�[0m resource_group_name = (known after apply)
      �[32m+�[0m�[0m retention_in_days   = (known after apply)
      �[32m+�[0m�[0m tags                = (known after apply)
      �[32m+�[0m�[0m workspace_id        = (known after apply)
    }

�[1m  # module.bot_service.data.azurerm_monitor_diagnostic_categories.diagnostic_categories_bot_service_azure_bot�[0m will be read during apply
  # (config refers to values not yet known)
�[0m �[36m<=�[0m�[0m data "azurerm_monitor_diagnostic_categories" "diagnostic_categories_bot_service_azure_bot" {
      �[32m+�[0m�[0m id                  = (known after apply)
      �[32m+�[0m�[0m log_category_groups = (known after apply)
      �[32m+�[0m�[0m log_category_types  = (known after apply)
      �[32m+�[0m�[0m metrics             = (known after apply)
      �[32m+�[0m�[0m resource_id         = (known after apply)
    }

�[1m  # module.bot_service.azurerm_bot_service_azure_bot.bot_service_azure_bot�[0m will be created
�[0m  �[32m+�[0m�[0m resource "azurerm_bot_service_azure_bot" "bot_service_azure_bot" {
      �[32m+�[0m�[0m developer_app_insights_application_id = (known after apply)
      �[32m+�[0m�[0m developer_app_insights_key            = (known after apply)
      �[32m+�[0m�[0m display_name                          = "Azure Bot Service - Bfr Dev Bot001"
      �[32m+�[0m�[0m endpoint                              = (known after apply)
      �[32m+�[0m�[0m icon_url                              = "https://docs.botframework.com/static/devportal/client/images/bot-framework-default.png"
      �[32m+�[0m�[0m id                                    = (known after apply)
      �[32m+�[0m�[0m local_authentication_enabled          = false
      �[32m+�[0m�[0m location                              = "global"
      �[32m+�[0m�[0m luis_app_ids                          = []
      �[32m+�[0m�[0m microsoft_app_id                      = (known after apply)
      �[32m+�[0m�[0m microsoft_app_msi_id                  = (known after apply)
      �[32m+�[0m�[0m microsoft_app_tenant_id               = (known after apply)
      �[32m+�[0m�[0m microsoft_app_type                    = "UserAssignedMSI"
      �[32m+�[0m�[0m name                                  = "bfr-dev-bot001"
      �[32m+�[0m�[0m public_network_access_enabled         = true
      �[32m+�[0m�[0m resource_group_name                   = "bfr-dev-bot-cnsm-rg"
      �[32m+�[0m�[0m sku                                   = "S1"
      �[32m+�[0m�[0m streaming_endpoint_enabled            = false
      �[32m+�[0m�[0m tags                                  = {
          �[32m+�[0m�[0m "workload" = "bot-assistant"
        }
    }

�[1m  # module.bot_service.azurerm_monitor_diagnostic_setting.diagnostic_setting_bot_service_azure_bot["0"]�[0m will be created
�[0m  �[32m+�[0m�[0m resource "azurerm_monitor_diagnostic_setting" "diagnostic_setting_bot_service_azure_bot" {
      �[32m+�[0m�[0m id                             = (known after apply)
      �[32m+�[0m�[0m log_analytics_destination_type = (known after apply)
      �[32m+�[0m�[0m log_analytics_workspace_id     = "/subscriptions/e82c5267-9dc4-4f45-ac13-abdd5e130d27/resourceGroups/ptt-dev-logging-rg/providers/Microsoft.OperationalInsights/workspaces/ptt-dev-log001"
      �[32m+�[0m�[0m name                           = "applicationLogs-0"
      �[32m+�[0m�[0m target_resource_id             = (known after apply)

      �[32m+�[0m�[0m enabled_log (known after apply)

      �[32m+�[0m�[0m metric (known after apply)
    }

�[1m  # module.bot_service.azurerm_private_endpoint.bot_service_azure_bot_private_endpoint_bot�[0m will be created
�[0m  �[32m+�[0m�[0m resource "azurerm_private_endpoint" "bot_service_azure_bot_private_endpoint_bot" {
      �[32m+�[0m�[0m custom_dns_configs            = (known after apply)
      �[32m+�[0m�[0m custom_network_interface_name = "bfr-dev-bot001-bot-nic"
      �[32m+�[0m�[0m id                            = (known after apply)
      �[32m+�[0m�[0m location                      = "northeurope"
      �[32m+�[0m�[0m name                          = "bfr-dev-bot001-bot-pe"
      �[32m+�[0m�[0m network_interface             = (known after apply)
      �[32m+�[0m�[0m private_dns_zone_configs      = (known after apply)
      �[32m+�[0m�[0m resource_group_name           = "bfr-dev-bot-cnsm-rg"
      �[32m+�[0m�[0m subnet_id                     = (known after apply)
      �[32m+�[0m�[0m tags                          = {
          �[32m+�[0m�[0m "workload" = "bot-assistant"
        }

      �[32m+�[0m�[0m private_dns_zone_group {
          �[32m+�[0m�[0m id                   = (known after apply)
          �[32m+�[0m�[0m name                 = "bfr-dev-bot001-arecord"
          �[32m+�[0m�[0m private_dns_zone_ids = [
              �[32m+�[0m�[0m "/subscriptions/e82c5267-9dc4-4f45-ac13-abdd5e130d27/resourceGroups/ptt-dev-privatedns-rg/providers/Microsoft.Network/privateDnsZones/privatelink.directline.botframework.com",
            ]
        }

      �[32m+�[0m�[0m private_service_connection {
          �[32m+�[0m�[0m is_manual_connection           = false
          �[32m+�[0m�[0m name                           = "bfr-dev-bot001-bot-svc"
          �[32m+�[0m�[0m private_connection_resource_id = (known after apply)
          �[32m+�[0m�[0m private_ip_address             = (known after apply)
          �[32m+�[0m�[0m subresource_names              = [
              �[32m+�[0m�[0m "Bot",
            ]
        }
    }

�[1m  # module.bot_service.azurerm_private_endpoint.bot_service_azure_bot_private_endpoint_token�[0m will be created
�[0m  �[32m+�[0m�[0m resource "azurerm_private_endpoint" "bot_service_azure_bot_private_endpoint_token" {
      �[32m+�[0m�[0m custom_dns_configs            = (known after apply)
      �[32m+�[0m�[0m custom_network_interface_name = "bfr-dev-bot001-token-nic"
      �[32m+�[0m�[0m id                            = (known after apply)
      �[32m+�[0m�[0m location                      = "northeurope"
      �[32m+�[0m�[0m name                          = "bfr-dev-bot001-token-pe"
      �[32m+�[0m�[0m network_interface             = (known after apply)
      �[32m+�[0m�[0m private_dns_zone_configs      = (known after apply)
      �[32m+�[0m�[0m resource_group_name           = "bfr-dev-bot-cnsm-rg"
      �[32m+�[0m�[0m subnet_id                     = (known after apply)
      �[32m+�[0m�[0m tags                          = {
          �[32m+�[0m�[0m "workload" = "bot-assistant"
        }

      �[32m+�[0m�[0m private_dns_zone_group {
          �[32m+�[0m�[0m id                   = (known after apply)
          �[32m+�[0m�[0m name                 = "bfr-dev-bot001-arecord"
          �[32m+�[0m�[0m private_dns_zone_ids = [
              �[32m+�[0m�[0m "/subscriptions/e82c5267-9dc4-4f45-ac13-abdd5e130d27/resourceGroups/ptt-dev-privatedns-rg/providers/Microsoft.Network/privateDnsZones/privatelink.token.botframework.com",
            ]
        }

      �[32m+�[0m�[0m private_service_connection {
          �[32m+�[0m�[0m is_manual_connection           = false
          �[32m+�[0m�[0m name                           = "bfr-dev-bot001-token-svc"
          �[32m+�[0m�[0m private_connection_resource_id = (known after apply)
          �[32m+�[0m�[0m private_ip_address             = (known after apply)
          �[32m+�[0m�[0m subresource_names              = [
              �[32m+�[0m�[0m "Token",
            ]
        }
    }

�[1m  # module.bot_service.time_sleep.sleep_connectivity�[0m will be created
�[0m  �[32m+�[0m�[0m resource "time_sleep" "sleep_connectivity" {
      �[32m+�[0m�[0m create_duration = "120s"
      �[32m+�[0m�[0m id              = (known after apply)
    }

�[1m  # module.cosmosdb_account.data.azurerm_monitor_diagnostic_categories.diagnostic_categories_cosmosdb_account�[0m will be read during apply
  # (config refers to values not yet known)
�[0m �[36m<=�[0m�[0m data "azurerm_monitor_diagnostic_categories" "diagnostic_categories_cosmosdb_account" {
      �[32m+�[0m�[0m id                  = (known after apply)
      �[32m+�[0m�[0m log_category_groups = (known after apply)
      �[32m+�[0m�[0m log_category_types  = (known after apply)
      �[32m+�[0m�[0m metrics             = (known after apply)
      �[32m+�[0m�[0m resource_id         = (known after apply)
    }

�[1m  # module.cosmosdb_account.azurerm_cosmosdb_account.cosmosdb_account�[0m will be created
�[0m  �[32m+�[0m�[0m resource "azurerm_cosmosdb_account" "cosmosdb_account" {
      �[32m+�[0m�[0m access_key_metadata_writes_enabled           = true
      �[32m+�[0m�[0m analytical_storage_enabled                   = false
      �[32m+�[0m�[0m automatic_failover_enabled                   = false
      �[32m+�[0m�[0m burst_capacity_enabled                       = false
      �[32m+�[0m�[0m create_mode                                  = "Default"
      �[32m+�[0m�[0m default_identity_type                        = "FirstPartyIdentity"
      �[32m+�[0m�[0m endpoint                                     = (known after apply)
      �[32m+�[0m�[0m free_tier_enabled                            = false
      �[32m+�[0m�[0m id                                           = (known after apply)
      �[32m+�[0m�[0m is_virtual_network_filter_enabled            = true
      �[32m+�[0m�[0m kind                                         = "GlobalDocumentDB"
      �[32m+�[0m�[0m local_authentication_disabled                = false
      �[32m+�[0m�[0m location                                     = "northeurope"
      �[32m+�[0m�[0m minimal_tls_version                          = "Tls12"
      �[32m+�[0m�[0m mongo_server_version                         = (known after apply)
      �[32m+�[0m�[0m multiple_write_locations_enabled             = false
      �[32m+�[0m�[0m name                                         = "bfr-dev-cosmos001"
      �[32m+�[0m�[0m network_acl_bypass_for_azure_services        = false
      �[32m+�[0m�[0m network_acl_bypass_ids                       = []
      �[32m+�[0m�[0m offer_type                                   = "Standard"
      �[32m+�[0m�[0m partition_merge_enabled                      = false
      �[32m+�[0m�[0m primary_key                                  = (sensitive value)
      �[32m+�[0m�[0m primary_mongodb_connection_string            = (sensitive value)
      �[32m+�[0m�[0m primary_readonly_key                         = (sensitive value)
      �[32m+�[0m�[0m primary_readonly_mongodb_connection_string   = (sensitive value)
      �[32m+�[0m�[0m primary_readonly_sql_connection_string       = (sensitive value)
      �[32m+�[0m�[0m primary_sql_connection_string                = (sensitive value)
      �[32m+�[0m�[0m public_network_access_enabled                = false
      �[32m+�[0m�[0m read_endpoints                               = (known after apply)
      �[32m+�[0m�[0m resource_group_name                          = "bfr-dev-bot-cnsm-rg"
      �[32m+�[0m�[0m secondary_key                                = (sensitive value)
      �[32m+�[0m�[0m secondary_mongodb_connection_string          = (sensitive value)
      �[32m+�[0m�[0m secondary_readonly_key                       = (sensitive value)
      �[32m+�[0m�[0m secondary_readonly_mongodb_connection_string = (sensitive value)
      �[32m+�[0m�[0m secondary_readonly_sql_connection_string     = (sensitive value)
      �[32m+�[0m�[0m secondary_sql_connection_string              = (sensitive value)
      �[32m+�[0m�[0m tags                                         = {
          �[32m+�[0m�[0m "workload" = "bot-assistant"
        }
      �[32m+�[0m�[0m write_endpoints                              = (known after apply)

      �[32m+�[0m�[0m analytical_storage {
          �[32m+�[0m�[0m schema_type = "FullFidelity"
        }

      �[32m+�[0m�[0m backup {
          �[32m+�[0m�[0m interval_in_minutes = (known after apply)
          �[32m+�[0m�[0m retention_in_hours  = (known after apply)
          �[32m+�[0m�[0m storage_redundancy  = (known after apply)
          �[32m+�[0m�[0m tier                = "Continuous7Days"
          �[32m+�[0m�[0m type                = "Continuous"
        }

      �[32m+�[0m�[0m capabilities (known after apply)

      �[32m+�[0m�[0m capacity {
          �[32m+�[0m�[0m total_throughput_limit = -1
        }

      �[32m+�[0m�[0m consistency_policy {
          �[32m+�[0m�[0m consistency_level = "Strong"
        }

      �[32m+�[0m�[0m geo_location {
          �[32m+�[0m�[0m failover_priority = 0
          �[32m+�[0m�[0m id                = (known after apply)
          �[32m+�[0m�[0m location          = "northeurope"
          �[32m+�[0m�[0m zone_redundant    = false
        }

      �[32m+�[0m�[0m identity {
          �[32m+�[0m�[0m principal_id = (known after apply)
          �[32m+�[0m�[0m tenant_id    = (known after apply)
          �[32m+�[0m�[0m type         = "SystemAssigned"
        }
    }

�[1m  # module.cosmosdb_account.azurerm_private_endpoint.private_endpoint_cosmosdb_account["Sql"]�[0m will be created
�[0m  �[32m+�[0m�[0m resource "azurerm_private_endpoint" "private_endpoint_cosmosdb_account" {
      �[32m+�[0m�[0m custom_dns_configs            = (known after apply)
      �[32m+�[0m�[0m custom_network_interface_name = "bfr-dev-cosmos001-Sql-nic"
      �[32m+�[0m�[0m id                            = (known after apply)
      �[32m+�[0m�[0m location                      = "northeurope"
      �[32m+�[0m�[0m name                          = "bfr-dev-cosmos001-Sql-pe"
      �[32m+�[0m�[0m network_interface             = (known after apply)
      �[32m+�[0m�[0m private_dns_zone_configs      = (known after apply)
      �[32m+�[0m�[0m resource_group_name           = "bfr-dev-bot-cnsm-rg"
      �[32m+�[0m�[0m subnet_id                     = (known after apply)
      �[32m+�[0m�[0m tags                          = {
          �[32m+�[0m�[0m "workload" = "bot-assistant"
        }

      �[32m+�[0m�[0m private_dns_zone_group {
          �[32m+�[0m�[0m id                   = (known after apply)
          �[32m+�[0m�[0m name                 = "bfr-dev-cosmos001-arecord"
          �[32m+�[0m�[0m private_dns_zone_ids = [
              �[32m+�[0m�[0m "/subscriptions/e82c5267-9dc4-4f45-ac13-abdd5e130d27/resourceGroups/ptt-dev-privatedns-rg/providers/Microsoft.Network/privateDnsZones/privatelink.documents.azure.com",
            ]
        }

      �[32m+�[0m�[0m private_service_connection {
          �[32m+�[0m�[0m is_manual_connection           = false
          �[32m+�[0m�[0m name                           = "bfr-dev-cosmos001-Sql-svc"
          �[32m+�[0m�[0m private_connection_resource_id = (known after apply)
          �[32m+�[0m�[0m private_ip_address             = (known after apply)
          �[32m+�[0m�[0m subresource_names              = [
              �[32m+�[0m�[0m "Sql",
            ]
        }
    }

�[1m  # module.cosmosdb_account.time_sleep.sleep_connectivity�[0m will be created
�[0m  �[32m+�[0m�[0m resource "time_sleep" "sleep_connectivity" {
      �[32m+�[0m�[0m create_duration = "0s"
      �[32m+�[0m�[0m id              = (known after apply)
    }

�[1m  # module.data_factory.data.azurerm_monitor_diagnostic_categories.diagnostic_categories_data_factory�[0m will be read during apply
  # (config refers to values not yet known)
�[0m �[36m<=�[0m�[0m data "azurerm_monitor_diagnostic_categories" "diagnostic_categories_data_factory" {
      �[32m+�[0m�[0m id                  = (known after apply)
      �[32m+�[0m�[0m log_category_groups = (known after apply)
      �[32m+�[0m�[0m log_category_types  = (known after apply)
      �[32m+�[0m�[0m metrics             = (known after apply)
      �[32m+�[0m�[0m resource_id         = (known after apply)
    }

�[1m  # module.data_factory.azurerm_data_factory.data_factory�[0m will be created
�[0m  �[32m+�[0m�[0m resource "azurerm_data_factory" "data_factory" {
      �[32m+�[0m�[0m id                              = (known after apply)
      �[32m+�[0m�[0m location                        = "northeurope"
      �[32m+�[0m�[0m managed_virtual_network_enabled = true
      �[32m+�[0m�[0m name                            = "bfr-dev-adf001"
      �[32m+�[0m�[0m public_network_enabled          = false
      �[32m+�[0m�[0m resource_group_name             = "bfr-dev-bot-ngst-rg"
      �[32m+�[0m�[0m tags                            = {
          �[32m+�[0m�[0m "workload" = "bot-assistant"
        }

      �[32m+�[0m�[0m identity {
          �[32m+�[0m�[0m principal_id = (known after apply)
          �[32m+�[0m�[0m tenant_id    = (known after apply)
          �[32m+�[0m�[0m type         = "SystemAssigned"
        }
    }

�[1m  # module.data_factory.azurerm_data_factory_managed_private_endpoint.data_factory_managed_private_endpoints["keyvault-vault"]�[0m will be created
�[0m  �[32m+�[0m�[0m resource "azurerm_data_factory_managed_private_endpoint" "data_factory_managed_private_endpoints" {
      �[32m+�[0m�[0m data_factory_id    = (known after apply)
      �[32m+�[0m�[0m fqdns              = (known after apply)
      �[32m+�[0m�[0m id                 = (known after apply)
      �[32m+�[0m�[0m name               = "keyvault-vault"
      �[32m+�[0m�[0m subresource_name   = "vault"
      �[32m+�[0m�[0m target_resource_id = (known after apply)
    }

�[1m  # module.data_factory.azurerm_data_factory_managed_private_endpoint.data_factory_managed_private_endpoints["storage-blob"]�[0m will be created
�[0m  �[32m+�[0m�[0m resource "azurerm_data_factory_managed_private_endpoint" "data_factory_managed_private_endpoints" {
      �[32m+�[0m�[0m data_factory_id    = (known after apply)
      �[32m+�[0m�[0m fqdns              = (known after apply)
      �[32m+�[0m�[0m id                 = (known after apply)
      �[32m+�[0m�[0m name               = "storage-blob"
      �[32m+�[0m�[0m subresource_name   = "blob"
      �[32m+�[0m�[0m target_resource_id = (known after apply)
    }

�[1m  # module.data_factory.azurerm_monitor_diagnostic_setting.diagnostic_setting_data_factory["0"]�[0m will be created
�[0m  �[32m+�[0m�[0m resource "azurerm_monitor_diagnostic_setting" "diagnostic_setting_data_factory" {
      �[32m+�[0m�[0m id                             = (known after apply)
      �[32m+�[0m�[0m log_analytics_destination_type = (known after apply)
      �[32m+�[0m�[0m log_analytics_workspace_id     = "/subscriptions/e82c5267-9dc4-4f45-ac13-abdd5e130d27/resourceGroups/ptt-dev-logging-rg/providers/Microsoft.OperationalInsights/workspaces/ptt-dev-log001"
      �[32m+�[0m�[0m name                           = "applicationLogs-0"
      �[32m+�[0m�[0m target_resource_id             = (known after apply)

      �[32m+�[0m�[0m enabled_log (known after apply)

      �[32m+�[0m�[0m metric (known after apply)
    }

�[1m  # module.data_factory.azurerm_private_endpoint.data_factory_private_endpoint_data_factory�[0m will be created
�[0m  �[32m+�[0m�[0m resource "azurerm_private_endpoint" "data_factory_private_endpoint_data_factory" {
      �[32m+�[0m�[0m custom_dns_configs            = (known after apply)
      �[32m+�[0m�[0m custom_network_interface_name = "bfr-dev-adf001-datafactory-nic"
      �[32m+�[0m�[0m id                            = (known after apply)
      �[32m+�[0m�[0m location                      = "northeurope"
      �[32m+�[0m�[0m name                          = "bfr-dev-adf001-datafactory-pe"
      �[32m+�[0m�[0m network_interface             = (known after apply)
      �[32m+�[0m�[0m private_dns_zone_configs      = (known after apply)
      �[32m+�[0m�[0m resource_group_name           = "bfr-dev-bot-ngst-rg"
      �[32m+�[0m�[0m subnet_id                     = (known after apply)
      �[32m+�[0m�[0m tags                          = {
          �[32m+�[0m�[0m "workload" = "bot-assistant"
        }

      �[32m+�[0m�[0m private_dns_zone_group {
          �[32m+�[0m�[0m id                   = (known after apply)
          �[32m+�[0m�[0m name                 = "bfr-dev-adf001-arecord"
          �[32m+�[0m�[0m private_dns_zone_ids = [
              �[32m+�[0m�[0m "/subscriptions/e82c5267-9dc4-4f45-ac13-abdd5e130d27/resourceGroups/ptt-dev-privatedns-rg/providers/Microsoft.Network/privateDnsZones/privatelink.datafactory.azure.net",
            ]
        }

      �[32m+�[0m�[0m private_service_connection {
          �[32m+�[0m�[0m is_manual_connection           = false
          �[32m+�[0m�[0m name                           = "bfr-dev-adf001-datafactory-svc"
          �[32m+�[0m�[0m private_connection_resource_id = (known after apply)
          �[32m+�[0m�[0m private_ip_address             = (known after apply)
          �[32m+�[0m�[0m subresource_names              = [
              �[32m+�[0m�[0m "dataFactory",
            ]
        }
    }

�[1m  # module.data_factory.null_resource.data_factory_managed_private_endpoint_storage_blob_approval["keyvault-vault"]�[0m will be created
�[0m  �[32m+�[0m�[0m resource "null_resource" "data_factory_managed_private_endpoint_storage_blob_approval" {
      �[32m+�[0m�[0m id       = (known after apply)
      �[32m+�[0m�[0m triggers = {
          �[32m+�[0m�[0m "run_once" = "true"
        }
    }

�[1m  # module.data_factory.null_resource.data_factory_managed_private_endpoint_storage_blob_approval["storage-blob"]�[0m will be created
�[0m  �[32m+�[0m�[0m resource "null_resource" "data_factory_managed_private_endpoint_storage_blob_approval" {
      �[32m+�[0m�[0m id       = (known after apply)
      �[32m+�[0m�[0m triggers = {
          �[32m+�[0m�[0m "run_once" = "true"
        }
    }

�[1m  # module.data_factory.time_sleep.sleep_connectivity�[0m will be created
�[0m  �[32m+�[0m�[0m resource "time_sleep" "sleep_connectivity" {
      �[32m+�[0m�[0m create_duration = "120s"
      �[32m+�[0m�[0m id              = (known after apply)
    }

�[1m  # module.key_vault_consumption.data.azurerm_monitor_diagnostic_categories.diagnostic_categories_key_vault�[0m will be read during apply
  # (config refers to values not yet known)
�[0m �[36m<=�[0m�[0m data "azurerm_monitor_diagnostic_categories" "diagnostic_categories_key_vault" {
      �[32m+�[0m�[0m id                  = (known after apply)
      �[32m+�[0m�[0m log_category_groups = (known after apply)
      �[32m+�[0m�[0m log_category_types  = (known after apply)
      �[32m+�[0m�[0m metrics             = (known after apply)
      �[32m+�[0m�[0m resource_id         = (known after apply)
    }

�[1m  # module.key_vault_consumption.azurerm_key_vault.key_vault�[0m will be created
�[0m  �[32m+�[0m�[0m resource "azurerm_key_vault" "key_vault" {
      �[32m+�[0m�[0m access_policy                   = []
      �[32m+�[0m�[0m enable_rbac_authorization       = true
      �[32m+�[0m�[0m enabled_for_deployment          = false
      �[32m+�[0m�[0m enabled_for_disk_encryption     = false
      �[32m+�[0m�[0m enabled_for_template_deployment = false
      �[32m+�[0m�[0m id                              = (known after apply)
      �[32m+�[0m�[0m location                        = "northeurope"
      �[32m+�[0m�[0m name                            = "bfr-dev-kv001"
      �[32m+�[0m�[0m public_network_access_enabled   = false
      �[32m+�[0m�[0m purge_protection_enabled        = true
      �[32m+�[0m�[0m resource_group_name             = "bfr-dev-bot-cnsm-rg"
      �[32m+�[0m�[0m sku_name                        = "standard"
      �[32m+�[0m�[0m soft_delete_retention_days      = 7
      �[32m+�[0m�[0m tags                            = {
          �[32m+�[0m�[0m "workload" = "bot-assistant"
        }
      �[32m+�[0m�[0m tenant_id                       = "37963dd4-f4e6-40f8-a7d6-24b97919e452"
      �[32m+�[0m�[0m vault_uri                       = (known after apply)

      �[32m+�[0m�[0m contact (known after apply)

      �[32m+�[0m�[0m network_acls {
          �[32m+�[0m�[0m bypass         = "AzureServices"
          �[32m+�[0m�[0m default_action = "Deny"
        }
    }

�[1m  # module.key_vault_consumption.azurerm_monitor_diagnostic_setting.diagnostic_setting_key_vault["0"]�[0m will be created
�[0m  �[32m+�[0m�[0m resource "azurerm_monitor_diagnostic_setting" "diagnostic_setting_key_vault" {
      �[32m+�[0m�[0m id                             = (known after apply)
      �[32m+�[0m�[0m log_analytics_destination_type = (known after apply)
      �[32m+�[0m�[0m log_analytics_workspace_id     = "/subscriptions/e82c5267-9dc4-4f45-ac13-abdd5e130d27/resourceGroups/ptt-dev-logging-rg/providers/Microsoft.OperationalInsights/workspaces/ptt-dev-log001"
      �[32m+�[0m�[0m name                           = "applicationLogs-0"
      �[32m+�[0m�[0m target_resource_id             = (known after apply)

      �[32m+�[0m�[0m enabled_log (known after apply)

      �[32m+�[0m�[0m metric (known after apply)
    }

�[1m  # module.key_vault_consumption.azurerm_private_endpoint.private_endpoint_cognitive_account_vault�[0m will be created
�[0m  �[32m+�[0m�[0m resource "azurerm_private_endpoint" "private_endpoint_cognitive_account_vault" {
      �[32m+�[0m�[0m custom_dns_configs            = (known after apply)
      �[32m+�[0m�[0m custom_network_interface_name = "bfr-dev-kv001-vault-nic"
      �[32m+�[0m�[0m id                            = (known after apply)
      �[32m+�[0m�[0m location                      = "northeurope"
      �[32m+�[0m�[0m name                          = "bfr-dev-kv001-vault-pe"
      �[32m+�[0m�[0m network_interface             = (known after apply)
      �[32m+�[0m�[0m private_dns_zone_configs      = (known after apply)
      �[32m+�[0m�[0m resource_group_name           = "bfr-dev-bot-cnsm-rg"
      �[32m+�[0m�[0m subnet_id                     = (known after apply)
      �[32m+�[0m�[0m tags                          = {
          �[32m+�[0m�[0m "workload" = "bot-assistant"
        }

      �[32m+�[0m�[0m private_dns_zone_group {
          �[32m+�[0m�[0m id                   = (known after apply)
          �[32m+�[0m�[0m name                 = "bfr-dev-kv001-arecord"
          �[32m+�[0m�[0m private_dns_zone_ids = [
              �[32m+�[0m�[0m "/subscriptions/e82c5267-9dc4-4f45-ac13-abdd5e130d27/resourceGroups/ptt-dev-privatedns-rg/providers/Microsoft.Network/privateDnsZones/privatelink.vaultcore.azure.net",
            ]
        }

      �[32m+�[0m�[0m private_service_connection {
          �[32m+�[0m�[0m is_manual_connection           = false
          �[32m+�[0m�[0m name                           = "bfr-dev-kv001-vault-svc"
          �[32m+�[0m�[0m private_connection_resource_id = (known after apply)
          �[32m+�[0m�[0m private_ip_address             = (known after apply)
          �[32m+�[0m�[0m subresource_names              = [
              �[32m+�[0m�[0m "vault",
            ]
        }
    }

�[1m  # module.key_vault_consumption.azurerm_role_assignment.current_roleassignment_key_vault�[0m will be created
�[0m  �[32m+�[0m�[0m resource "azurerm_role_assignment" "current_roleassignment_key_vault" {
      �[32m+�[0m�[0m id                               = (known after apply)
      �[32m+�[0m�[0m name                             = (known after apply)
      �[32m+�[0m�[0m principal_id                     = "973df2ad-4e5e-4e8b-9df6-17f61e9efd55"
      �[32m+�[0m�[0m principal_type                   = (known after apply)
      �[32m+�[0m�[0m role_definition_id               = (known after apply)
      �[32m+�[0m�[0m role_definition_name             = "Key Vault Administrator"
      �[32m+�[0m�[0m scope                            = (known after apply)
      �[32m+�[0m�[0m skip_service_principal_aad_check = (known after apply)
    }

�[1m  # module.key_vault_consumption.time_sleep.sleep_connectivity�[0m will be created
�[0m  �[32m+�[0m�[0m resource "time_sleep" "sleep_connectivity" {
      �[32m+�[0m�[0m create_duration = "120s"
      �[32m+�[0m�[0m id              = (known after apply)
    }

�[1m  # module.key_vault_ingestion.data.azurerm_monitor_diagnostic_categories.diagnostic_categories_key_vault�[0m will be read during apply
  # (config refers to values not yet known)
�[0m �[36m<=�[0m�[0m data "azurerm_monitor_diagnostic_categories" "diagnostic_categories_key_vault" {
      �[32m+�[0m�[0m id                  = (known after apply)
      �[32m+�[0m�[0m log_category_groups = (known after apply)
      �[32m+�[0m�[0m log_category_types  = (known after apply)
      �[32m+�[0m�[0m metrics             = (known after apply)
      �[32m+�[0m�[0m resource_id         = (known after apply)
    }

�[1m  # module.key_vault_ingestion.azurerm_key_vault.key_vault�[0m will be created
�[0m  �[32m+�[0m�[0m resource "azurerm_key_vault" "key_vault" {
      �[32m+�[0m�[0m access_policy                   = []
      �[32m+�[0m�[0m enable_rbac_authorization       = true
      �[32m+�[0m�[0m enabled_for_deployment          = false
      �[32m+�[0m�[0m enabled_for_disk_encryption     = false
      �[32m+�[0m�[0m enabled_for_template_deployment = false
      �[32m+�[0m�[0m id                              = (known after apply)
      �[32m+�[0m�[0m location                        = "northeurope"
      �[32m+�[0m�[0m name                            = "bfr-dev-kv001"
      �[32m+�[0m�[0m public_network_access_enabled   = false
      �[32m+�[0m�[0m purge_protection_enabled        = true
      �[32m+�[0m�[0m resource_group_name             = "bfr-dev-bot-cnsm-rg"
      �[32m+�[0m�[0m sku_name                        = "standard"
      �[32m+�[0m�[0m soft_delete_retention_days      = 7
      �[32m+�[0m�[0m tags                            = {
          �[32m+�[0m�[0m "workload" = "bot-assistant"
        }
      �[32m+�[0m�[0m tenant_id                       = "37963dd4-f4e6-40f8-a7d6-24b97919e452"
      �[32m+�[0m�[0m vault_uri                       = (known after apply)

      �[32m+�[0m�[0m contact (known after apply)

      �[32m+�[0m�[0m network_acls {
          �[32m+�[0m�[0m bypass         = "AzureServices"
          �[32m+�[0m�[0m default_action = "Deny"
        }
    }

�[1m  # module.key_vault_ingestion.azurerm_monitor_diagnostic_setting.diagnostic_setting_key_vault["0"]�[0m will be created
�[0m  �[32m+�[0m�[0m resource "azurerm_monitor_diagnostic_setting" "diagnostic_setting_key_vault" {
      �[32m+�[0m�[0m id                             = (known after apply)
      �[32m+�[0m�[0m log_analytics_destination_type = (known after apply)
      �[32m+�[0m�[0m log_analytics_workspace_id     = "/subscriptions/e82c5267-9dc4-4f45-ac13-abdd5e130d27/resourceGroups/ptt-dev-logging-rg/providers/Microsoft.OperationalInsights/workspaces/ptt-dev-log001"
      �[32m+�[0m�[0m name                           = "applicationLogs-0"
      �[32m+�[0m�[0m target_resource_id             = (known after apply)

      �[32m+�[0m�[0m enabled_log (known after apply)

      �[32m+�[0m�[0m metric (known after apply)
    }

�[1m  # module.key_vault_ingestion.azurerm_private_endpoint.private_endpoint_cognitive_account_vault�[0m will be created
�[0m  �[32m+�[0m�[0m resource "azurerm_private_endpoint" "private_endpoint_cognitive_account_vault" {
      �[32m+�[0m�[0m custom_dns_configs            = (known after apply)
      �[32m+�[0m�[0m custom_network_interface_name = "bfr-dev-kv001-vault-nic"
      �[32m+�[0m�[0m id                            = (known after apply)
      �[32m+�[0m�[0m location                      = "northeurope"
      �[32m+�[0m�[0m name                          = "bfr-dev-kv001-vault-pe"
      �[32m+�[0m�[0m network_interface             = (known after apply)
      �[32m+�[0m�[0m private_dns_zone_configs      = (known after apply)
      �[32m+�[0m�[0m resource_group_name           = "bfr-dev-bot-cnsm-rg"
      �[32m+�[0m�[0m subnet_id                     = (known after apply)
      �[32m+�[0m�[0m tags                          = {
          �[32m+�[0m�[0m "workload" = "bot-assistant"
        }

      �[32m+�[0m�[0m private_dns_zone_group {
          �[32m+�[0m�[0m id                   = (known after apply)
          �[32m+�[0m�[0m name                 = "bfr-dev-kv001-arecord"
          �[32m+�[0m�[0m private_dns_zone_ids = [
              �[32m+�[0m�[0m "/subscriptions/e82c5267-9dc4-4f45-ac13-abdd5e130d27/resourceGroups/ptt-dev-privatedns-rg/providers/Microsoft.Network/privateDnsZones/privatelink.vaultcore.azure.net",
            ]
        }

      �[32m+�[0m�[0m private_service_connection {
          �[32m+�[0m�[0m is_manual_connection           = false
          �[32m+�[0m�[0m name                           = "bfr-dev-kv001-vault-svc"
          �[32m+�[0m�[0m private_connection_resource_id = (known after apply)
          �[32m+�[0m�[0m private_ip_address             = (known after apply)
          �[32m+�[0m�[0m subresource_names              = [
              �[32m+�[0m�[0m "vault",
            ]
        }
    }

�[1m  # module.key_vault_ingestion.azurerm_role_assignment.current_roleassignment_key_vault�[0m will be created
�[0m  �[32m+�[0m�[0m resource "azurerm_role_assignment" "current_roleassignment_key_vault" {
      �[32m+�[0m�[0m id                               = (known after apply)
      �[32m+�[0m�[0m name                             = (known after apply)
      �[32m+�[0m�[0m principal_id                     = "973df2ad-4e5e-4e8b-9df6-17f61e9efd55"
      �[32m+�[0m�[0m principal_type                   = (known after apply)
      �[32m+�[0m�[0m role_definition_id               = (known after apply)
      �[32m+�[0m�[0m role_definition_name             = "Key Vault Administrator"
      �[32m+�[0m�[0m scope                            = (known after apply)
      �[32m+�[0m�[0m skip_service_principal_aad_check = (known after apply)
    }

�[1m  # module.key_vault_ingestion.time_sleep.sleep_connectivity�[0m will be created
�[0m  �[32m+�[0m�[0m resource "time_sleep" "sleep_connectivity" {
      �[32m+�[0m�[0m create_duration = "120s"
      �[32m+�[0m�[0m id              = (known after apply)
    }

�[1m  # module.storage_account.data.azurerm_monitor_diagnostic_categories.diagnostic_categories_storage_account�[0m will be read during apply
  # (config refers to values not yet known)
�[0m �[36m<=�[0m�[0m data "azurerm_monitor_diagnostic_categories" "diagnostic_categories_storage_account" {
      �[32m+�[0m�[0m id                  = (known after apply)
      �[32m+�[0m�[0m log_category_groups = (known after apply)
      �[32m+�[0m�[0m log_category_types  = (known after apply)
      �[32m+�[0m�[0m metrics             = (known after apply)
      �[32m+�[0m�[0m resource_id         = (known after apply)
    }

�[1m  # module.storage_account.azurerm_monitor_diagnostic_setting.diagnostic_setting_storage_account["0"]�[0m will be created
�[0m  �[32m+�[0m�[0m resource "azurerm_monitor_diagnostic_setting" "diagnostic_setting_storage_account" {
      �[32m+�[0m�[0m id                             = (known after apply)
      �[32m+�[0m�[0m log_analytics_destination_type = (known after apply)
      �[32m+�[0m�[0m log_analytics_workspace_id     = "/subscriptions/e82c5267-9dc4-4f45-ac13-abdd5e130d27/resourceGroups/ptt-dev-logging-rg/providers/Microsoft.OperationalInsights/workspaces/ptt-dev-log001"
      �[32m+�[0m�[0m name                           = "applicationLogs-0"
      �[32m+�[0m�[0m target_resource_id             = (known after apply)

      �[32m+�[0m�[0m enabled_log (known after apply)

      �[32m+�[0m�[0m metric (known after apply)
    }

�[1m  # module.storage_account.azurerm_private_endpoint.private_endpoint_storage_account["blob"]�[0m will be created
�[0m  �[32m+�[0m�[0m resource "azurerm_private_endpoint" "private_endpoint_storage_account" {
      �[32m+�[0m�[0m custom_dns_configs            = (known after apply)
      �[32m+�[0m�[0m custom_network_interface_name = "bfrdevstg001-blob-nic"
      �[32m+�[0m�[0m id                            = (known after apply)
      �[32m+�[0m�[0m location                      = "northeurope"
      �[32m+�[0m�[0m name                          = "bfrdevstg001-blob-pe"
      �[32m+�[0m�[0m network_interface             = (known after apply)
      �[32m+�[0m�[0m private_dns_zone_configs      = (known after apply)
      �[32m+�[0m�[0m resource_group_name           = "bfr-dev-bot-ngst-rg"
      �[32m+�[0m�[0m subnet_id                     = (known after apply)
      �[32m+�[0m�[0m tags                          = {
          �[32m+�[0m�[0m "workload" = "bot-assistant"
        }

      �[32m+�[0m�[0m private_dns_zone_group {
          �[32m+�[0m�[0m id                   = (known after apply)
          �[32m+�[0m�[0m name                 = "bfrdevstg001-arecord"
          �[32m+�[0m�[0m private_dns_zone_ids = [
              �[32m+�[0m�[0m "/subscriptions/e82c5267-9dc4-4f45-ac13-abdd5e130d27/resourceGroups/ptt-dev-privatedns-rg/providers/Microsoft.Network/privateDnsZones/privatelink.blob.core.windows.net",
            ]
        }

      �[32m+�[0m�[0m private_service_connection {
          �[32m+�[0m�[0m is_manual_connection           = false
          �[32m+�[0m�[0m name                           = "bfrdevstg001-blob-svc"
          �[32m+�[0m�[0m private_connection_resource_id = (known after apply)
          �[32m+�[0m�[0m private_ip_address             = (known after apply)
          �[32m+�[0m�[0m subresource_names              = [
              �[32m+�[0m�[0m "blob",
            ]
        }
    }

�[1m  # module.storage_account.azurerm_role_assignment.current_roleassignment_storage_blob_data_owner�[0m will be created
�[0m  �[32m+�[0m�[0m resource "azurerm_role_assignment" "current_roleassignment_storage_blob_data_owner" {
      �[32m+�[0m�[0m description                      = "Required for creating data plane artifacts"
      �[32m+�[0m�[0m id                               = (known after apply)
      �[32m+�[0m�[0m name                             = (known after apply)
      �[32m+�[0m�[0m principal_id                     = "973df2ad-4e5e-4e8b-9df6-17f61e9efd55"
      �[32m+�[0m�[0m principal_type                   = "ServicePrincipal"
      �[32m+�[0m�[0m role_definition_id               = (known after apply)
      �[32m+�[0m�[0m role_definition_name             = "Storage Blob Data Owner"
      �[32m+�[0m�[0m scope                            = (known after apply)
      �[32m+�[0m�[0m skip_service_principal_aad_check = (known after apply)
    }

�[1m  # module.storage_account.azurerm_storage_account.storage_account�[0m will be created
�[0m  �[32m+�[0m�[0m resource "azurerm_storage_account" "storage_account" {
      �[32m+�[0m�[0m access_tier                        = "Hot"
      �[32m+�[0m�[0m account_kind                       = "StorageV2"
      �[32m+�[0m�[0m account_replication_type           = "ZRS"
      �[32m+�[0m�[0m account_tier                       = "Standard"
      �[32m+�[0m�[0m allow_nested_items_to_be_public    = false
      �[32m+�[0m�[0m allowed_copy_scope                 = "AAD"
      �[32m+�[0m�[0m cross_tenant_replication_enabled   = false
      �[32m+�[0m�[0m default_to_oauth_authentication    = true
      �[32m+�[0m�[0m dns_endpoint_type                  = "Standard"
      �[32m+�[0m�[0m https_traffic_only_enabled         = true
      �[32m+�[0m�[0m id                                 = (known after apply)
      �[32m+�[0m�[0m infrastructure_encryption_enabled  = true
      �[32m+�[0m�[0m is_hns_enabled                     = false
      �[32m+�[0m�[0m large_file_share_enabled           = false
      �[32m+�[0m�[0m local_user_enabled                 = true
      �[32m+�[0m�[0m location                           = "northeurope"
      �[32m+�[0m�[0m min_tls_version                    = "TLS1_2"
      �[32m+�[0m�[0m name                               = "bfrdevstg001"
      �[32m+�[0m�[0m nfsv3_enabled                      = false
      �[32m+�[0m�[0m primary_access_key                 = (sensitive value)
      �[32m+�[0m�[0m primary_blob_connection_string     = (sensitive value)
      �[32m+�[0m�[0m primary_blob_endpoint              = (known after apply)
      �[32m+�[0m�[0m primary_blob_host                  = (known after apply)
      �[32m+�[0m�[0m primary_blob_internet_endpoint     = (known after apply)
      �[32m+�[0m�[0m primary_blob_internet_host         = (known after apply)
      �[32m+�[0m�[0m primary_blob_microsoft_endpoint    = (known after apply)
      �[32m+�[0m�[0m primary_blob_microsoft_host        = (known after apply)
      �[32m+�[0m�[0m primary_connection_string          = (sensitive value)
      �[32m+�[0m�[0m primary_dfs_endpoint               = (known after apply)
      �[32m+�[0m�[0m primary_dfs_host                   = (known after apply)
      �[32m+�[0m�[0m primary_dfs_internet_endpoint      = (known after apply)
      �[32m+�[0m�[0m primary_dfs_internet_host          = (known after apply)
      �[32m+�[0m�[0m primary_dfs_microsoft_endpoint     = (known after apply)
      �[32m+�[0m�[0m primary_dfs_microsoft_host         = (known after apply)
      �[32m+�[0m�[0m primary_file_endpoint              = (known after apply)
      �[32m+�[0m�[0m primary_file_host                  = (known after apply)
      �[32m+�[0m�[0m primary_file_internet_endpoint     = (known after apply)
      �[32m+�[0m�[0m primary_file_internet_host         = (known after apply)
      �[32m+�[0m�[0m primary_file_microsoft_endpoint    = (known after apply)
      �[32m+�[0m�[0m primary_file_microsoft_host        = (known after apply)
      �[32m+�[0m�[0m primary_location                   = (known after apply)
      �[32m+�[0m�[0m primary_queue_endpoint             = (known after apply)
      �[32m+�[0m�[0m primary_queue_host                 = (known after apply)
      �[32m+�[0m�[0m primary_queue_microsoft_endpoint   = (known after apply)
      �[32m+�[0m�[0m primary_queue_microsoft_host       = (known after apply)
      �[32m+�[0m�[0m primary_table_endpoint             = (known after apply)
      �[32m+�[0m�[0m primary_table_host                 = (known after apply)
      �[32m+�[0m�[0m primary_table_microsoft_endpoint   = (known after apply)
      �[32m+�[0m�[0m primary_table_microsoft_host       = (known after apply)
      �[32m+�[0m�[0m primary_web_endpoint               = (known after apply)
      �[32m+�[0m�[0m primary_web_host                   = (known after apply)
      �[32m+�[0m�[0m primary_web_internet_endpoint      = (known after apply)
      �[32m+�[0m�[0m primary_web_internet_host          = (known after apply)
      �[32m+�[0m�[0m primary_web_microsoft_endpoint     = (known after apply)
      �[32m+�[0m�[0m primary_web_microsoft_host         = (known after apply)
      �[32m+�[0m�[0m public_network_access_enabled      = true
      �[32m+�[0m�[0m queue_encryption_key_type          = "Account"
      �[32m+�[0m�[0m resource_group_name                = "bfr-dev-bot-ngst-rg"
      �[32m+�[0m�[0m secondary_access_key               = (sensitive value)
      �[32m+�[0m�[0m secondary_blob_connection_string   = (sensitive value)
      �[32m+�[0m�[0m secondary_blob_endpoint            = (known after apply)
      �[32m+�[0m�[0m secondary_blob_host                = (known after apply)
      �[32m+�[0m�[0m secondary_blob_internet_endpoint   = (known after apply)
      �[32m+�[0m�[0m secondary_blob_internet_host       = (known after apply)
      �[32m+�[0m�[0m secondary_blob_microsoft_endpoint  = (known after apply)
      �[32m+�[0m�[0m secondary_blob_microsoft_host      = (known after apply)
      �[32m+�[0m�[0m secondary_connection_string        = (sensitive value)
      �[32m+�[0m�[0m secondary_dfs_endpoint             = (known after apply)
      �[32m+�[0m�[0m secondary_dfs_host                 = (known after apply)
      �[32m+�[0m�[0m secondary_dfs_internet_endpoint    = (known after apply)
      �[32m+�[0m�[0m secondary_dfs_internet_host        = (known after apply)
      �[32m+�[0m�[0m secondary_dfs_microsoft_endpoint   = (known after apply)
      �[32m+�[0m�[0m secondary_dfs_microsoft_host       = (known after apply)
      �[32m+�[0m�[0m secondary_file_endpoint            = (known after apply)
      �[32m+�[0m�[0m secondary_file_host                = (known after apply)
      �[32m+�[0m�[0m secondary_file_internet_endpoint   = (known after apply)
      �[32m+�[0m�[0m secondary_file_internet_host       = (known after apply)
      �[32m+�[0m�[0m secondary_file_microsoft_endpoint  = (known after apply)
      �[32m+�[0m�[0m secondary_file_microsoft_host      = (known after apply)
      �[32m+�[0m�[0m secondary_location                 = (known after apply)
      �[32m+�[0m�[0m secondary_queue_endpoint           = (known after apply)
      �[32m+�[0m�[0m secondary_queue_host               = (known after apply)
      �[32m+�[0m�[0m secondary_queue_microsoft_endpoint = (known after apply)
      �[32m+�[0m�[0m secondary_queue_microsoft_host     = (known after apply)
      �[32m+�[0m�[0m secondary_table_endpoint           = (known after apply)
      �[32m+�[0m�[0m secondary_table_host               = (known after apply)
      �[32m+�[0m�[0m secondary_table_microsoft_endpoint = (known after apply)
      �[32m+�[0m�[0m secondary_table_microsoft_host     = (known after apply)
      �[32m+�[0m�[0m secondary_web_endpoint             = (known after apply)
      �[32m+�[0m�[0m secondary_web_host                 = (known after apply)
      �[32m+�[0m�[0m secondary_web_internet_endpoint    = (known after apply)
      �[32m+�[0m�[0m secondary_web_internet_host        = (known after apply)
      �[32m+�[0m�[0m secondary_web_microsoft_endpoint   = (known after apply)
      �[32m+�[0m�[0m secondary_web_microsoft_host       = (known after apply)
      �[32m+�[0m�[0m sftp_enabled                       = false
      �[32m+�[0m�[0m shared_access_key_enabled          = false
      �[32m+�[0m�[0m table_encryption_key_type          = "Account"
      �[32m+�[0m�[0m tags                               = {
          �[32m+�[0m�[0m "workload" = "bot-assistant"
        }

      �[32m+�[0m�[0m blob_properties {
          �[32m+�[0m�[0m change_feed_enabled      = false
          �[32m+�[0m�[0m default_service_version  = (known after apply)
          �[32m+�[0m�[0m last_access_time_enabled = false
          �[32m+�[0m�[0m versioning_enabled       = false

          �[32m+�[0m�[0m container_delete_retention_policy {
              �[32m+�[0m�[0m days = 7
            }

          �[32m+�[0m�[0m delete_retention_policy {
              �[32m+�[0m�[0m days                     = 7
              �[32m+�[0m�[0m permanent_delete_enabled = false
            }
        }

      �[32m+�[0m�[0m network_rules {
          �[32m+�[0m�[0m bypass                     = [
              �[32m+�[0m�[0m "None",
            ]
          �[32m+�[0m�[0m default_action             = "Deny"
          �[32m+�[0m�[0m ip_rules                   = (known after apply)
          �[32m+�[0m�[0m virtual_network_subnet_ids = (known after apply)

          �[32m+�[0m�[0m private_link_access {
              �[32m+�[0m�[0m endpoint_resource_id = "/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/providers/Microsoft.Security/datascanners/storageDataScanner"
              �[32m+�[0m�[0m endpoint_tenant_id   = "37963dd4-f4e6-40f8-a7d6-24b97919e452"
            }
          �[32m+�[0m�[0m private_link_access {
              �[32m+�[0m�[0m endpoint_resource_id = "/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/*/providers/Microsoft.CognitiveServices/accounts/*"
              �[32m+�[0m�[0m endpoint_tenant_id   = "37963dd4-f4e6-40f8-a7d6-24b97919e452"
            }
        }

      �[32m+�[0m�[0m queue_properties (known after apply)

      �[32m+�[0m�[0m routing {
          �[32m+�[0m�[0m choice                      = "MicrosoftRouting"
          �[32m+�[0m�[0m publish_internet_endpoints  = false
          �[32m+�[0m�[0m publish_microsoft_endpoints = false
        }

      �[32m+�[0m�[0m sas_policy {
          �[32m+�[0m�[0m expiration_action = "Log"
          �[32m+�[0m�[0m expiration_period = "1.00:00:00"
        }

      �[32m+�[0m�[0m share_properties (known after apply)
    }

�[1m  # module.storage_account.azurerm_storage_container.storage_container["curated"]�[0m will be created
�[0m  �[32m+�[0m�[0m resource "azurerm_storage_container" "storage_container" {
      �[32m+�[0m�[0m container_access_type             = "private"
      �[32m+�[0m�[0m default_encryption_scope          = (known after apply)
      �[32m+�[0m�[0m encryption_scope_override_enabled = true
      �[32m+�[0m�[0m has_immutability_policy           = (known after apply)
      �[32m+�[0m�[0m has_legal_hold                    = (known after apply)
      �[32m+�[0m�[0m id                                = (known after apply)
      �[32m+�[0m�[0m metadata                          = (known after apply)
      �[32m+�[0m�[0m name                              = "curated"
      �[32m+�[0m�[0m resource_manager_id               = (known after apply)
      �[32m+�[0m�[0m storage_account_name              = "bfrdevstg001"
    }

�[1m  # module.storage_account.azurerm_storage_container.storage_container["raw"]�[0m will be created
�[0m  �[32m+�[0m�[0m resource "azurerm_storage_container" "storage_container" {
      �[32m+�[0m�[0m container_access_type             = "private"
      �[32m+�[0m�[0m default_encryption_scope          = (known after apply)
      �[32m+�[0m�[0m encryption_scope_override_enabled = true
      �[32m+�[0m�[0m has_immutability_policy           = (known after apply)
      �[32m+�[0m�[0m has_legal_hold                    = (known after apply)
      �[32m+�[0m�[0m id                                = (known after apply)
      �[32m+�[0m�[0m metadata                          = (known after apply)
      �[32m+�[0m�[0m name                              = "raw"
      �[32m+�[0m�[0m resource_manager_id               = (known after apply)
      �[32m+�[0m�[0m storage_account_name              = "bfrdevstg001"
    }

�[1m  # module.storage_account.time_sleep.sleep_connectivity�[0m will be created
�[0m  �[32m+�[0m�[0m resource "time_sleep" "sleep_connectivity" {
      �[32m+�[0m�[0m create_duration = "120s"
      �[32m+�[0m�[0m id              = (known after apply)
    }

�[1m  # module.user_assigned_identity.azurerm_user_assigned_identity.user_assigned_identity�[0m will be created
�[0m  �[32m+�[0m�[0m resource "azurerm_user_assigned_identity" "user_assigned_identity" {
      �[32m+�[0m�[0m client_id           = (known after apply)
      �[32m+�[0m�[0m id                  = (known after apply)
      �[32m+�[0m�[0m location            = "northeurope"
      �[32m+�[0m�[0m name                = "bfr-dev-uai001"
      �[32m+�[0m�[0m principal_id        = (known after apply)
      �[32m+�[0m�[0m resource_group_name = "bfr-dev-bot-cnsm-rg"
      �[32m+�[0m�[0m tags                = {
          �[32m+�[0m�[0m "workload" = "bot-assistant"
        }
      �[32m+�[0m�[0m tenant_id           = (known after apply)
    }

�[1mPlan:�[0m 54 to add, 0 to change, 0 to destroy.
�[0m�[33m╷�[0m�[0m
�[33m│�[0m �[0m�[1m�[33mWarning: �[0m�[0m�[1mReference to undefined provider�[0m
�[33m│�[0m �[0m
�[33m│�[0m �[0m�[0m  on datafactory.tf line 6, in module "data_factory":
�[33m│�[0m �[0m   6:     �[4mtime�[0m    = time�[0m
�[33m│�[0m �[0m
�[33m│�[0m �[0mThere is no explicit declaration for local provider name "time" in
�[33m│�[0m �[0mmodule.data_factory, so Terraform is assuming you mean to pass a
�[33m│�[0m �[0mconfiguration for "hashicorp/time".
�[33m│�[0m �[0m
�[33m│�[0m �[0mIf you also control the child module, add a required_providers entry named
�[33m│�[0m �[0m"time" with the source address "hashicorp/time".
�[33m╵�[0m�[0m
�[90m
─────────────────────────────────────────────────────────────────────────────�[0m

Note: You didn't use the -out option to save this plan, so Terraform can't
guarantee to take exactly these actions if you run "terraform apply" now.
Releasing state lock. This may take a few moments...

@github-actions
Copy link

Terraform Lint Results

  • Terraform Version 📎1.9.8
  • Working Directory 📂./code/infra
  • Terraform Format and Style 🖌success

@github-actions
Copy link

Terraform Validation & Plan Results

  • Terraform Version 📎1.9.8
  • Working Directory 📂./code/infra
  • Terraform Initialization ⚙️success
  • Terraform Validation 🤖success
  • Terraform Plan 📖success
Show Plan

terraform
Acquiring state lock. This may take a few moments...
�[0m�[1mdata.local_file.file_system_prompt: Reading...�[0m�[0m
�[0m�[1mdata.local_file.file_system_prompt: Read complete after 0s [id=1b64caca607e392bc85ff27243e6022401cc3184]�[0m
�[0m�[1mazurerm_resource_group.resource_group_ingestion: Refreshing state... [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/bfr-dev-bot-ngst-rg]�[0m
�[0m�[1mmodule.azure_open_ai.data.azurerm_client_config.current: Reading...�[0m�[0m
�[0m�[1mmodule.storage_account.data.azurerm_client_config.current: Reading...�[0m�[0m
�[0m�[1mmodule.azure_open_ai.data.azurerm_client_config.current: Read complete after 0s [id=Y2xpZW50Q29uZmlncy9jbGllbnRJZD1lNWRmNjg0My1lYmRlLTRkNzktOWM3ZS03NDMxYTNjZDQzZDI7b2JqZWN0SWQ9OTczZGYyYWQtNGU1ZS00ZThiLTlkZjYtMTdmNjFlOWVmZDU1O3N1YnNjcmlwdGlvbklkPTFmZGFiMTE4LTE2MzgtNDE5YS04YjEyLTA2Yzk1NDM3MTRhMDt0ZW5hbnRJZD0zNzk2M2RkNC1mNGU2LTQwZjgtYTdkNi0yNGI5NzkxOWU0NTI=]�[0m
�[0m�[1mmodule.key_vault_consumption.data.azurerm_client_config.current: Reading...�[0m�[0m
�[0m�[1mmodule.data_factory.data.azurerm_subscription.current: Reading...�[0m�[0m
�[0m�[1mdata.azurerm_virtual_network.virtual_network: Reading...�[0m�[0m
�[0m�[1mmodule.key_vault_ingestion.data.azurerm_client_config.current: Reading...�[0m�[0m
�[0m�[1mmodule.storage_account.data.azurerm_client_config.current: Read complete after 0s [id=Y2xpZW50Q29uZmlncy9jbGllbnRJZD1lNWRmNjg0My1lYmRlLTRkNzktOWM3ZS03NDMxYTNjZDQzZDI7b2JqZWN0SWQ9OTczZGYyYWQtNGU1ZS00ZThiLTlkZjYtMTdmNjFlOWVmZDU1O3N1YnNjcmlwdGlvbklkPTFmZGFiMTE4LTE2MzgtNDE5YS04YjEyLTA2Yzk1NDM3MTRhMDt0ZW5hbnRJZD0zNzk2M2RkNC1mNGU2LTQwZjgtYTdkNi0yNGI5NzkxOWU0NTI=]�[0m
�[0m�[1mdata.azurerm_route_table.route_table: Reading...�[0m�[0m
�[0m�[1mazurerm_resource_group.resource_group_consumption: Refreshing state... [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/bfr-dev-bot-cnsm-rg]�[0m
�[0m�[1mmodule.key_vault_consumption.data.azurerm_client_config.current: Read complete after 0s [id=Y2xpZW50Q29uZmlncy9jbGllbnRJZD1lNWRmNjg0My1lYmRlLTRkNzktOWM3ZS03NDMxYTNjZDQzZDI7b2JqZWN0SWQ9OTczZGYyYWQtNGU1ZS00ZThiLTlkZjYtMTdmNjFlOWVmZDU1O3N1YnNjcmlwdGlvbklkPTFmZGFiMTE4LTE2MzgtNDE5YS04YjEyLTA2Yzk1NDM3MTRhMDt0ZW5hbnRJZD0zNzk2M2RkNC1mNGU2LTQwZjgtYTdkNi0yNGI5NzkxOWU0NTI=]�[0m
�[0m�[1mdata.azurerm_client_config.current: Reading...�[0m�[0m
�[0m�[1mmodule.key_vault_ingestion.data.azurerm_client_config.current: Read complete after 0s [id=Y2xpZW50Q29uZmlncy9jbGllbnRJZD1lNWRmNjg0My1lYmRlLTRkNzktOWM3ZS03NDMxYTNjZDQzZDI7b2JqZWN0SWQ9OTczZGYyYWQtNGU1ZS00ZThiLTlkZjYtMTdmNjFlOWVmZDU1O3N1YnNjcmlwdGlvbklkPTFmZGFiMTE4LTE2MzgtNDE5YS04YjEyLTA2Yzk1NDM3MTRhMDt0ZW5hbnRJZD0zNzk2M2RkNC1mNGU2LTQwZjgtYTdkNi0yNGI5NzkxOWU0NTI=]�[0m
�[0m�[1mdata.azurerm_client_config.current: Read complete after 0s [id=Y2xpZW50Q29uZmlncy9jbGllbnRJZD1lNWRmNjg0My1lYmRlLTRkNzktOWM3ZS03NDMxYTNjZDQzZDI7b2JqZWN0SWQ9OTczZGYyYWQtNGU1ZS00ZThiLTlkZjYtMTdmNjFlOWVmZDU1O3N1YnNjcmlwdGlvbklkPTFmZGFiMTE4LTE2MzgtNDE5YS04YjEyLTA2Yzk1NDM3MTRhMDt0ZW5hbnRJZD0zNzk2M2RkNC1mNGU2LTQwZjgtYTdkNi0yNGI5NzkxOWU0NTI=]�[0m
�[0m�[1mdata.azurerm_network_security_group.network_security_group: Reading...�[0m�[0m
�[0m�[1mmodule.data_factory.azurerm_data_factory.data_factory: Refreshing state... [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/bfr-dev-bot-ngst-rg/providers/Microsoft.DataFactory/factories/bfr-dev-adf001]�[0m
�[0m�[1mmodule.storage_account.azurerm_storage_account.storage_account: Refreshing state... [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/bfr-dev-bot-ngst-rg/providers/Microsoft.Storage/storageAccounts/bfrdevstg001]�[0m
�[0m�[1mdata.azurerm_route_table.route_table: Read complete after 0s [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/ptt-dev-networking-rg/providers/Microsoft.Network/routeTables/ptt-dev-default-rt001]�[0m
�[0m�[1mmodule.data_factory.data.azurerm_subscription.current: Read complete after 0s [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0]�[0m
�[0m�[1mmodule.user_assigned_identity.azurerm_user_assigned_identity.user_assigned_identity: Refreshing state... [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/bfr-dev-bot-cnsm-rg/providers/Microsoft.ManagedIdentity/userAssignedIdentities/bfr-dev-uai001]�[0m
�[0m�[1mmodule.app_service_plan.azurerm_service_plan.service_plan: Refreshing state... [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/bfr-dev-bot-cnsm-rg/providers/Microsoft.Web/serverFarms/bfr-dev-asp001]�[0m
�[0m�[1mmodule.cosmosdb_account.azurerm_cosmosdb_account.cosmosdb_account: Refreshing state... [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/bfr-dev-bot-cnsm-rg/providers/Microsoft.DocumentDB/databaseAccounts/bfr-dev-cosmos001]�[0m
�[0m�[1mmodule.azure_open_ai.azurerm_cognitive_account.cognitive_account: Refreshing state... [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/bfr-dev-bot-cnsm-rg/providers/Microsoft.CognitiveServices/accounts/bfr-dev-aoai001]�[0m
�[0m�[1mmodule.application_insights.azurerm_application_insights.application_insights: Refreshing state... [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/bfr-dev-bot-cnsm-rg/providers/Microsoft.Insights/components/bfr-dev-appi001]�[0m
�[0m�[1mdata.azurerm_virtual_network.virtual_network: Read complete after 0s [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/ptt-dev-networking-rg/providers/Microsoft.Network/virtualNetworks/spoke-ptt-dev-vnet001]�[0m
�[0m�[1mdata.azurerm_network_security_group.network_security_group: Read complete after 0s [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/ptt-dev-networking-rg/providers/Microsoft.Network/networkSecurityGroups/ptt-dev-default-nsg001]�[0m
�[0m�[1mazapi_resource.subnet_web_app: Refreshing state... [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/ptt-dev-networking-rg/providers/Microsoft.Network/virtualNetworks/spoke-ptt-dev-vnet001/subnets/WebAppSubnetBot]�[0m
�[0m�[1mmodule.app_service_plan.data.azurerm_monitor_diagnostic_categories.diagnostic_categories_service_plan: Reading...�[0m�[0m
�[0m�[1mdata.azurerm_log_analytics_workspace.log_analytics_workspace: Reading...�[0m�[0m
�[0m�[1mmodule.data_factory.data.azurerm_monitor_diagnostic_categories.diagnostic_categories_data_factory: Reading...�[0m�[0m
�[0m�[1mmodule.app_service_plan.data.azurerm_monitor_diagnostic_categories.diagnostic_categories_service_plan: Read complete after 0s [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/bfr-dev-bot-cnsm-rg/providers/Microsoft.Web/serverFarms/bfr-dev-asp001]�[0m
�[0m�[1mmodule.app_service_plan.azurerm_monitor_diagnostic_setting.diagnostic_setting_service_plan["0"]: Refreshing state... [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/bfr-dev-bot-cnsm-rg/providers/Microsoft.Web/serverFarms/bfr-dev-asp001|applicationLogs-0]�[0m
�[0m�[1mdata.azurerm_log_analytics_workspace.log_analytics_workspace: Read complete after 0s [id=/subscriptions/e82c5267-9dc4-4f45-ac13-abdd5e130d27/resourceGroups/ptt-dev-logging-rg/providers/Microsoft.OperationalInsights/workspaces/ptt-dev-log001]�[0m
�[0m�[1mmodule.data_factory.data.azurerm_monitor_diagnostic_categories.diagnostic_categories_data_factory: Read complete after 0s [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/bfr-dev-bot-ngst-rg/providers/Microsoft.DataFactory/factories/bfr-dev-adf001]�[0m
�[0m�[1mmodule.data_factory.azurerm_monitor_diagnostic_setting.diagnostic_setting_data_factory["0"]: Refreshing state... [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/bfr-dev-bot-ngst-rg/providers/Microsoft.DataFactory/factories/bfr-dev-adf001|applicationLogs-0]�[0m
�[0m�[1mmodule.azure_open_ai.data.azurerm_monitor_diagnostic_categories.diagnostic_categories_cognitive_account: Reading...�[0m�[0m
�[0m�[1mazurerm_role_assignment.uai_roleassignment_open_ai_contributor: Refreshing state... [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/bfr-dev-bot-cnsm-rg/providers/Microsoft.CognitiveServices/accounts/bfr-dev-aoai001/providers/Microsoft.Authorization/roleAssignments/e7e58016-b6f7-26e8-df5e-395cd83bd3d3]�[0m
�[0m�[1mazurerm_cognitive_deployment.cognitive_deployment_gpt_4o: Refreshing state... [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/bfr-dev-bot-cnsm-rg/providers/Microsoft.CognitiveServices/accounts/bfr-dev-aoai001/deployments/gpt-4o]�[0m
�[0m�[1mmodule.cosmosdb_account.data.azurerm_monitor_diagnostic_categories.diagnostic_categories_cosmosdb_account: Reading...�[0m�[0m
�[0m�[1mazurerm_cosmosdb_sql_database.cosmosdb_sql_database: Refreshing state... [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/bfr-dev-bot-cnsm-rg/providers/Microsoft.DocumentDB/databaseAccounts/bfr-dev-cosmos001/sqlDatabases/BotDb]�[0m
�[0m�[1mmodule.azure_open_ai.data.azurerm_monitor_diagnostic_categories.diagnostic_categories_cognitive_account: Read complete after 0s [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/bfr-dev-bot-cnsm-rg/providers/Microsoft.CognitiveServices/accounts/bfr-dev-aoai001]�[0m
�[0m�[1mmodule.azure_open_ai.azurerm_monitor_diagnostic_setting.diagnostic_setting_cognitive_account["0"]: Refreshing state... [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/bfr-dev-bot-cnsm-rg/providers/Microsoft.CognitiveServices/accounts/bfr-dev-aoai001|applicationLogs-0]�[0m
�[0m�[1mmodule.cosmosdb_account.data.azurerm_monitor_diagnostic_categories.diagnostic_categories_cosmosdb_account: Read complete after 0s [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/bfr-dev-bot-cnsm-rg/providers/Microsoft.DocumentDB/databaseAccounts/bfr-dev-cosmos001]�[0m
�[0m�[1mazapi_resource.subnet_private_endpoints: Refreshing state... [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/ptt-dev-networking-rg/providers/Microsoft.Network/virtualNetworks/spoke-ptt-dev-vnet001/subnets/PrivateEndpointSubnetBot]�[0m
�[0m�[1mmodule.azure_open_ai.azurerm_private_endpoint.private_endpoint_cognitive_account: Refreshing state... [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/bfr-dev-bot-cnsm-rg/providers/Microsoft.Network/privateEndpoints/bfr-dev-aoai001-account-pe]�[0m
�[0m�[1mmodule.cosmosdb_account.azurerm_private_endpoint.private_endpoint_cosmosdb_account["Sql"]: Refreshing state... [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/bfr-dev-bot-cnsm-rg/providers/Microsoft.Network/privateEndpoints/bfr-dev-cosmos001-Sql-pe]�[0m
�[0m�[1mmodule.data_factory.azurerm_private_endpoint.data_factory_private_endpoint_data_factory: Refreshing state... [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/bfr-dev-bot-ngst-rg/providers/Microsoft.Network/privateEndpoints/bfr-dev-adf001-datafactory-pe]�[0m
�[0m�[1mmodule.application_insights.data.azurerm_monitor_diagnostic_categories.diagnostic_categories_application_insights: Reading...�[0m�[0m
�[0m�[1mmodule.bot_service.data.azurerm_application_insights.application_insights: Reading...�[0m�[0m
�[0m�[1mmodule.application_insights.data.azurerm_monitor_diagnostic_categories.diagnostic_categories_application_insights: Read complete after 0s [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/bfr-dev-bot-cnsm-rg/providers/Microsoft.Insights/components/bfr-dev-appi001]�[0m
�[0m�[1mmodule.application_insights.azurerm_monitor_diagnostic_setting.diagnostic_setting_application_insights["0"]: Refreshing state... [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/bfr-dev-bot-cnsm-rg/providers/Microsoft.Insights/components/bfr-dev-appi001|applicationLogs-0]�[0m
�[0m�[1mmodule.bot_service.data.azurerm_application_insights.application_insights: Read complete after 0s [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/bfr-dev-bot-cnsm-rg/providers/Microsoft.Insights/components/bfr-dev-appi001]�[0m
�[0m�[1mazurerm_linux_web_app.linux_web_app: Refreshing state... [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/bfr-dev-bot-cnsm-rg/providers/Microsoft.Web/sites/bfr-dev-app001]�[0m
�[0m�[1mmodule.storage_account.azurerm_role_assignment.current_roleassignment_storage_blob_data_owner: Refreshing state... [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/bfr-dev-bot-ngst-rg/providers/Microsoft.Storage/storageAccounts/bfrdevstg001/providers/Microsoft.Authorization/roleAssignments/1215bdd9-4b88-a75d-6e49-8ce3b5f7b8c4]�[0m
�[0m�[1mmodule.storage_account.data.azurerm_monitor_diagnostic_categories.diagnostic_categories_storage_account: Reading...�[0m�[0m
�[0m�[1mmodule.storage_account.azurerm_private_endpoint.private_endpoint_storage_account["blob"]: Refreshing state... [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/bfr-dev-bot-ngst-rg/providers/Microsoft.Network/privateEndpoints/bfrdevstg001-blob-pe]�[0m
�[0m�[1mmodule.azure_open_ai.time_sleep.sleep_connectivity: Refreshing state... [id=2024-10-31T17:18:30Z]�[0m
�[0m�[1mmodule.data_factory.time_sleep.sleep_connectivity: Refreshing state... [id=2024-10-31T17:20:12Z]�[0m
�[0m�[1mmodule.storage_account.data.azurerm_monitor_diagnostic_categories.diagnostic_categories_storage_account: Read complete after 1s [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/bfr-dev-bot-ngst-rg/providers/Microsoft.Storage/storageAccounts/bfrdevstg001]�[0m
�[0m�[1mmodule.storage_account.azurerm_monitor_diagnostic_setting.diagnostic_setting_storage_account["0"]: Refreshing state... [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/bfr-dev-bot-ngst-rg/providers/Microsoft.Storage/storageAccounts/bfrdevstg001|applicationLogs-0]�[0m
�[0m�[1mmodule.cosmosdb_account.time_sleep.sleep_connectivity: Refreshing state... [id=2024-10-31T17:29:41Z]�[0m
�[0m�[1mmodule.storage_account.time_sleep.sleep_connectivity: Refreshing state... [id=2024-10-31T17:21:04Z]�[0m
�[0m�[1mmodule.storage_account.azurerm_storage_container.storage_container["curated"]: Refreshing state... [id=https://bfrdevstg001.blob.core.windows.net/curated]�[0m
�[0m�[1mmodule.storage_account.azurerm_storage_container.storage_container["raw"]: Refreshing state... [id=https://bfrdevstg001.blob.core.windows.net/raw]�[0m
�[0m�[1mmodule.bot_service.azurerm_bot_service_azure_bot.bot_service_azure_bot: Refreshing state... [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/bfr-dev-bot-cnsm-rg/providers/Microsoft.BotService/botServices/bfr-dev-bot001]�[0m
�[0m�[1mazurerm_monitor_diagnostic_setting.diagnostic_setting_linux_web_app: Refreshing state... [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/bfr-dev-bot-cnsm-rg/providers/Microsoft.Web/sites/bfr-dev-app001|logAnalytics]�[0m
�[0m�[1mazurerm_private_endpoint.linux_web_app_private_endpoint: Refreshing state... [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/bfr-dev-bot-cnsm-rg/providers/Microsoft.Network/privateEndpoints/bfr-dev-app001-pe]�[0m
�[0m�[1mmodule.bot_service.data.azurerm_monitor_diagnostic_categories.diagnostic_categories_bot_service_azure_bot: Reading...�[0m�[0m
�[0m�[1mmodule.bot_service.azurerm_private_endpoint.bot_service_azure_bot_private_endpoint_bot: Refreshing state... [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/bfr-dev-bot-cnsm-rg/providers/Microsoft.Network/privateEndpoints/bfr-dev-bot001-bot-pe]�[0m
�[0m�[1mazurerm_bot_connection.bot_connection_aadv2_oauth: Refreshing state... [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/bfr-dev-bot-cnsm-rg/providers/Microsoft.BotService/botServices/bfr-dev-bot001/connections/aadv2-oauth]�[0m
�[0m�[1mmodule.bot_service.azurerm_private_endpoint.bot_service_azure_bot_private_endpoint_token: Refreshing state... [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/bfr-dev-bot-cnsm-rg/providers/Microsoft.Network/privateEndpoints/bfr-dev-bot001-token-pe]�[0m
�[0m�[1mmodule.bot_service.data.azurerm_monitor_diagnostic_categories.diagnostic_categories_bot_service_azure_bot: Read complete after 0s [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/bfr-dev-bot-cnsm-rg/providers/Microsoft.BotService/botServices/bfr-dev-bot001]�[0m
�[0m�[1mmodule.bot_service.azurerm_monitor_diagnostic_setting.diagnostic_setting_bot_service_azure_bot["0"]: Refreshing state... [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/bfr-dev-bot-cnsm-rg/providers/Microsoft.BotService/botServices/bfr-dev-bot001|applicationLogs-0]�[0m
�[0m�[1mmodule.bot_service.time_sleep.sleep_connectivity: Refreshing state... [id=2024-10-31T17:24:36Z]�[0m

Terraform used the selected providers to generate the following execution
plan. Resource actions are indicated with the following symbols:
  �[32m+�[0m create�[0m
  �[33m~�[0m update in-place�[0m
 �[36m<=�[0m read (data resources)�[0m

Terraform will perform the following actions:

�[1m  # data.azurerm_monitor_diagnostic_categories.diagnostic_categories_linux_web_app�[0m will be read during apply
  # (depends on a resource or a module with changes pending)
�[0m �[36m<=�[0m�[0m data "azurerm_monitor_diagnostic_categories" "diagnostic_categories_linux_web_app" {
      �[32m+�[0m�[0m id                  = (known after apply)
      �[32m+�[0m�[0m log_category_groups = (known after apply)
      �[32m+�[0m�[0m log_category_types  = (known after apply)
      �[32m+�[0m�[0m metrics             = (known after apply)
      �[32m+�[0m�[0m resource_id         = "/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/bfr-dev-bot-cnsm-rg/providers/Microsoft.Web/sites/bfr-dev-app001"
    }

�[1m  # azurerm_linux_web_app.linux_web_app�[0m will be updated in-place
�[0m  �[33m~�[0m�[0m resource "azurerm_linux_web_app" "linux_web_app" {
      �[33m~�[0m�[0m app_settings                                   = {
          �[33m~�[0m�[0m "AZURE_OPENAI_SYSTEM_PROMPT"                 = <<-EOT
                You are a world-class assistant who tells jokes. For anything but jokes, respond politely that you are just trying to make everyone’s life a happier place.
            EOT
            �[90m# (18 unchanged elements hidden)�[0m�[0m
        }
        id                                             = "/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/bfr-dev-bot-cnsm-rg/providers/Microsoft.Web/sites/bfr-dev-app001"
        name                                           = "bfr-dev-app001"
        tags                                           = {
            "workload" = "bot-assistant"
        }
        �[90m# (24 unchanged attributes hidden)�[0m�[0m

        �[90m# (2 unchanged blocks hidden)�[0m�[0m
    }

�[1m  # azurerm_monitor_diagnostic_setting.diagnostic_setting_linux_web_app�[0m will be updated in-place
�[0m  �[33m~�[0m�[0m resource "azurerm_monitor_diagnostic_setting" "diagnostic_setting_linux_web_app" {
        id                             = "/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/bfr-dev-bot-cnsm-rg/providers/Microsoft.Web/sites/bfr-dev-app001|logAnalytics"
        name                           = "logAnalytics"
        �[90m# (5 unchanged attributes hidden)�[0m�[0m

      �[33m~�[0m�[0m enabled_log (known after apply)
      �[31m-�[0m�[0m enabled_log {
          �[31m-�[0m�[0m category_group = "allLogs" �[90m-> null�[0m�[0m
            �[90m# (1 unchanged attribute hidden)�[0m�[0m

          �[31m-�[0m�[0m retention_policy {
              �[31m-�[0m�[0m days    = 0 �[90m-> null�[0m�[0m
              �[31m-�[0m�[0m enabled = false �[90m-> null�[0m�[0m
            }
        }
      �[31m-�[0m�[0m enabled_log {
          �[31m-�[0m�[0m category_group = "audit" �[90m-> null�[0m�[0m
            �[90m# (1 unchanged attribute hidden)�[0m�[0m

          �[31m-�[0m�[0m retention_policy {
              �[31m-�[0m�[0m days    = 0 �[90m-> null�[0m�[0m
              �[31m-�[0m�[0m enabled = false �[90m-> null�[0m�[0m
            }
        }

      �[33m~�[0m�[0m metric (known after apply)
      �[31m-�[0m�[0m metric {
          �[31m-�[0m�[0m category = "AllMetrics" �[90m-> null�[0m�[0m
          �[31m-�[0m�[0m enabled  = true �[90m-> null�[0m�[0m

          �[31m-�[0m�[0m retention_policy {
              �[31m-�[0m�[0m days    = 0 �[90m-> null�[0m�[0m
              �[31m-�[0m�[0m enabled = false �[90m-> null�[0m�[0m
            }
        }
    }

�[1m  # azurerm_role_assignment.data_factory_roleassignment_key_vault_secrets_user�[0m will be created
�[0m  �[32m+�[0m�[0m resource "azurerm_role_assignment" "data_factory_roleassignment_key_vault_secrets_user" {
      �[32m+�[0m�[0m description                      = "Required for accessing secrets in the key vault from the data factory."
      �[32m+�[0m�[0m id                               = (known after apply)
      �[32m+�[0m�[0m name                             = (known after apply)
      �[32m+�[0m�[0m principal_id                     = "c464b453-4a51-4fd1-929e-6c8e17dc8da7"
      �[32m+�[0m�[0m principal_type                   = "ServicePrincipal"
      �[32m+�[0m�[0m role_definition_id               = (known after apply)
      �[32m+�[0m�[0m role_definition_name             = "Key Vault Secrets User"
      �[32m+�[0m�[0m scope                            = (known after apply)
      �[32m+�[0m�[0m skip_service_principal_aad_check = (known after apply)
    }

�[1m  # azurerm_role_assignment.data_factory_roleassignment_storage_blob_data_owner�[0m will be created
�[0m  �[32m+�[0m�[0m resource "azurerm_role_assignment" "data_factory_roleassignment_storage_blob_data_owner" {
      �[32m+�[0m�[0m description                      = "Required for reding and writing data from data factory."
      �[32m+�[0m�[0m id                               = (known after apply)
      �[32m+�[0m�[0m name                             = (known after apply)
      �[32m+�[0m�[0m principal_id                     = "c464b453-4a51-4fd1-929e-6c8e17dc8da7"
      �[32m+�[0m�[0m principal_type                   = "ServicePrincipal"
      �[32m+�[0m�[0m role_definition_id               = (known after apply)
      �[32m+�[0m�[0m role_definition_name             = "Storage Account Owner"
      �[32m+�[0m�[0m scope                            = "/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/bfr-dev-bot-ngst-rg/providers/Microsoft.Storage/storageAccounts/bfrdevstg001"
      �[32m+�[0m�[0m skip_service_principal_aad_check = (known after apply)
    }

�[1m  # azurerm_role_assignment.uai_roleassignment_key_vault_secrets_user�[0m will be created
�[0m  �[32m+�[0m�[0m resource "azurerm_role_assignment" "uai_roleassignment_key_vault_secrets_user" {
      �[32m+�[0m�[0m description                      = "Required for accessing secrets in the key vault from teh web app app settings."
      �[32m+�[0m�[0m id                               = (known after apply)
      �[32m+�[0m�[0m name                             = (known after apply)
      �[32m+�[0m�[0m principal_id                     = "3df57092-2e4d-45a8-9a9f-6d37abccdb39"
      �[32m+�[0m�[0m principal_type                   = "ServicePrincipal"
      �[32m+�[0m�[0m role_definition_id               = (known after apply)
      �[32m+�[0m�[0m role_definition_name             = "Key Vault Secrets User"
      �[32m+�[0m�[0m scope                            = (known after apply)
      �[32m+�[0m�[0m skip_service_principal_aad_check = (known after apply)
    }

�[1m  # module.data_factory.azurerm_data_factory_managed_private_endpoint.data_factory_managed_private_endpoints["keyvault-vault"]�[0m will be created
�[0m  �[32m+�[0m�[0m resource "azurerm_data_factory_managed_private_endpoint" "data_factory_managed_private_endpoints" {
      �[32m+�[0m�[0m data_factory_id    = "/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/bfr-dev-bot-ngst-rg/providers/Microsoft.DataFactory/factories/bfr-dev-adf001"
      �[32m+�[0m�[0m fqdns              = (known after apply)
      �[32m+�[0m�[0m id                 = (known after apply)
      �[32m+�[0m�[0m name               = "keyvault-vault"
      �[32m+�[0m�[0m subresource_name   = "vault"
      �[32m+�[0m�[0m target_resource_id = (known after apply)
    }

�[1m  # module.data_factory.azurerm_data_factory_managed_private_endpoint.data_factory_managed_private_endpoints["storage-blob"]�[0m will be created
�[0m  �[32m+�[0m�[0m resource "azurerm_data_factory_managed_private_endpoint" "data_factory_managed_private_endpoints" {
      �[32m+�[0m�[0m data_factory_id    = "/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/bfr-dev-bot-ngst-rg/providers/Microsoft.DataFactory/factories/bfr-dev-adf001"
      �[32m+�[0m�[0m fqdns              = (known after apply)
      �[32m+�[0m�[0m id                 = (known after apply)
      �[32m+�[0m�[0m name               = "storage-blob"
      �[32m+�[0m�[0m subresource_name   = "blob"
      �[32m+�[0m�[0m target_resource_id = "/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/bfr-dev-bot-ngst-rg/providers/Microsoft.Storage/storageAccounts/bfrdevstg001"
    }

�[1m  # module.data_factory.null_resource.data_factory_managed_private_endpoint_storage_blob_approval["keyvault-vault"]�[0m will be created
�[0m  �[32m+�[0m�[0m resource "null_resource" "data_factory_managed_private_endpoint_storage_blob_approval" {
      �[32m+�[0m�[0m id       = (known after apply)
      �[32m+�[0m�[0m triggers = {
          �[32m+�[0m�[0m "run_once" = "true"
        }
    }

�[1m  # module.data_factory.null_resource.data_factory_managed_private_endpoint_storage_blob_approval["storage-blob"]�[0m will be created
�[0m  �[32m+�[0m�[0m resource "null_resource" "data_factory_managed_private_endpoint_storage_blob_approval" {
      �[32m+�[0m�[0m id       = (known after apply)
      �[32m+�[0m�[0m triggers = {
          �[32m+�[0m�[0m "run_once" = "true"
        }
    }

�[1m  # module.key_vault_consumption.data.azurerm_monitor_diagnostic_categories.diagnostic_categories_key_vault�[0m will be read during apply
  # (config refers to values not yet known)
�[0m �[36m<=�[0m�[0m data "azurerm_monitor_diagnostic_categories" "diagnostic_categories_key_vault" {
      �[32m+�[0m�[0m id                  = (known after apply)
      �[32m+�[0m�[0m log_category_groups = (known after apply)
      �[32m+�[0m�[0m log_category_types  = (known after apply)
      �[32m+�[0m�[0m metrics             = (known after apply)
      �[32m+�[0m�[0m resource_id         = (known after apply)
    }

�[1m  # module.key_vault_consumption.azurerm_key_vault.key_vault�[0m will be created
�[0m  �[32m+�[0m�[0m resource "azurerm_key_vault" "key_vault" {
      �[32m+�[0m�[0m access_policy                   = []
      �[32m+�[0m�[0m enable_rbac_authorization       = true
      �[32m+�[0m�[0m enabled_for_deployment          = false
      �[32m+�[0m�[0m enabled_for_disk_encryption     = false
      �[32m+�[0m�[0m enabled_for_template_deployment = false
      �[32m+�[0m�[0m id                              = (known after apply)
      �[32m+�[0m�[0m location                        = "northeurope"
      �[32m+�[0m�[0m name                            = "bfr-dev-kv001"
      �[32m+�[0m�[0m public_network_access_enabled   = false
      �[32m+�[0m�[0m purge_protection_enabled        = true
      �[32m+�[0m�[0m resource_group_name             = "bfr-dev-bot-cnsm-rg"
      �[32m+�[0m�[0m sku_name                        = "standard"
      �[32m+�[0m�[0m soft_delete_retention_days      = 7
      �[32m+�[0m�[0m tags                            = {
          �[32m+�[0m�[0m "workload" = "bot-assistant"
        }
      �[32m+�[0m�[0m tenant_id                       = "37963dd4-f4e6-40f8-a7d6-24b97919e452"
      �[32m+�[0m�[0m vault_uri                       = (known after apply)

      �[32m+�[0m�[0m contact (known after apply)

      �[32m+�[0m�[0m network_acls {
          �[32m+�[0m�[0m bypass         = "AzureServices"
          �[32m+�[0m�[0m default_action = "Deny"
        }
    }

�[1m  # module.key_vault_consumption.azurerm_monitor_diagnostic_setting.diagnostic_setting_key_vault["0"]�[0m will be created
�[0m  �[32m+�[0m�[0m resource "azurerm_monitor_diagnostic_setting" "diagnostic_setting_key_vault" {
      �[32m+�[0m�[0m id                             = (known after apply)
      �[32m+�[0m�[0m log_analytics_destination_type = (known after apply)
      �[32m+�[0m�[0m log_analytics_workspace_id     = "/subscriptions/e82c5267-9dc4-4f45-ac13-abdd5e130d27/resourceGroups/ptt-dev-logging-rg/providers/Microsoft.OperationalInsights/workspaces/ptt-dev-log001"
      �[32m+�[0m�[0m name                           = "applicationLogs-0"
      �[32m+�[0m�[0m target_resource_id             = (known after apply)

      �[32m+�[0m�[0m enabled_log (known after apply)

      �[32m+�[0m�[0m metric (known after apply)
    }

�[1m  # module.key_vault_consumption.azurerm_private_endpoint.private_endpoint_cognitive_account_vault�[0m will be created
�[0m  �[32m+�[0m�[0m resource "azurerm_private_endpoint" "private_endpoint_cognitive_account_vault" {
      �[32m+�[0m�[0m custom_dns_configs            = (known after apply)
      �[32m+�[0m�[0m custom_network_interface_name = "bfr-dev-kv001-vault-nic"
      �[32m+�[0m�[0m id                            = (known after apply)
      �[32m+�[0m�[0m location                      = "northeurope"
      �[32m+�[0m�[0m name                          = "bfr-dev-kv001-vault-pe"
      �[32m+�[0m�[0m network_interface             = (known after apply)
      �[32m+�[0m�[0m private_dns_zone_configs      = (known after apply)
      �[32m+�[0m�[0m resource_group_name           = "bfr-dev-bot-cnsm-rg"
      �[32m+�[0m�[0m subnet_id                     = "/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/ptt-dev-networking-rg/providers/Microsoft.Network/virtualNetworks/spoke-ptt-dev-vnet001/subnets/PrivateEndpointSubnetBot"
      �[32m+�[0m�[0m tags                          = {
          �[32m+�[0m�[0m "workload" = "bot-assistant"
        }

      �[32m+�[0m�[0m private_dns_zone_group {
          �[32m+�[0m�[0m id                   = (known after apply)
          �[32m+�[0m�[0m name                 = "bfr-dev-kv001-arecord"
          �[32m+�[0m�[0m private_dns_zone_ids = [
              �[32m+�[0m�[0m "/subscriptions/e82c5267-9dc4-4f45-ac13-abdd5e130d27/resourceGroups/ptt-dev-privatedns-rg/providers/Microsoft.Network/privateDnsZones/privatelink.vaultcore.azure.net",
            ]
        }

      �[32m+�[0m�[0m private_service_connection {
          �[32m+�[0m�[0m is_manual_connection           = false
          �[32m+�[0m�[0m name                           = "bfr-dev-kv001-vault-svc"
          �[32m+�[0m�[0m private_connection_resource_id = (known after apply)
          �[32m+�[0m�[0m private_ip_address             = (known after apply)
          �[32m+�[0m�[0m subresource_names              = [
              �[32m+�[0m�[0m "vault",
            ]
        }
    }

�[1m  # module.key_vault_consumption.azurerm_role_assignment.current_roleassignment_key_vault�[0m will be created
�[0m  �[32m+�[0m�[0m resource "azurerm_role_assignment" "current_roleassignment_key_vault" {
      �[32m+�[0m�[0m id                               = (known after apply)
      �[32m+�[0m�[0m name                             = (known after apply)
      �[32m+�[0m�[0m principal_id                     = "973df2ad-4e5e-4e8b-9df6-17f61e9efd55"
      �[32m+�[0m�[0m principal_type                   = (known after apply)
      �[32m+�[0m�[0m role_definition_id               = (known after apply)
      �[32m+�[0m�[0m role_definition_name             = "Key Vault Administrator"
      �[32m+�[0m�[0m scope                            = (known after apply)
      �[32m+�[0m�[0m skip_service_principal_aad_check = (known after apply)
    }

�[1m  # module.key_vault_consumption.time_sleep.sleep_connectivity�[0m will be created
�[0m  �[32m+�[0m�[0m resource "time_sleep" "sleep_connectivity" {
      �[32m+�[0m�[0m create_duration = "120s"
      �[32m+�[0m�[0m id              = (known after apply)
    }

�[1m  # module.key_vault_ingestion.data.azurerm_monitor_diagnostic_categories.diagnostic_categories_key_vault�[0m will be read during apply
  # (config refers to values not yet known)
�[0m �[36m<=�[0m�[0m data "azurerm_monitor_diagnostic_categories" "diagnostic_categories_key_vault" {
      �[32m+�[0m�[0m id                  = (known after apply)
      �[32m+�[0m�[0m log_category_groups = (known after apply)
      �[32m+�[0m�[0m log_category_types  = (known after apply)
      �[32m+�[0m�[0m metrics             = (known after apply)
      �[32m+�[0m�[0m resource_id         = (known after apply)
    }

�[1m  # module.key_vault_ingestion.azurerm_key_vault.key_vault�[0m will be created
�[0m  �[32m+�[0m�[0m resource "azurerm_key_vault" "key_vault" {
      �[32m+�[0m�[0m access_policy                   = []
      �[32m+�[0m�[0m enable_rbac_authorization       = true
      �[32m+�[0m�[0m enabled_for_deployment          = false
      �[32m+�[0m�[0m enabled_for_disk_encryption     = false
      �[32m+�[0m�[0m enabled_for_template_deployment = false
      �[32m+�[0m�[0m id                              = (known after apply)
      �[32m+�[0m�[0m location                        = "northeurope"
      �[32m+�[0m�[0m name                            = "bfr-dev-ngst-kv001"
      �[32m+�[0m�[0m public_network_access_enabled   = false
      �[32m+�[0m�[0m purge_protection_enabled        = true
      �[32m+�[0m�[0m resource_group_name             = "bfr-dev-bot-cnsm-rg"
      �[32m+�[0m�[0m sku_name                        = "standard"
      �[32m+�[0m�[0m soft_delete_retention_days      = 7
      �[32m+�[0m�[0m tags                            = {
          �[32m+�[0m�[0m "workload" = "bot-assistant"
        }
      �[32m+�[0m�[0m tenant_id                       = "37963dd4-f4e6-40f8-a7d6-24b97919e452"
      �[32m+�[0m�[0m vault_uri                       = (known after apply)

      �[32m+�[0m�[0m contact (known after apply)

      �[32m+�[0m�[0m network_acls {
          �[32m+�[0m�[0m bypass         = "AzureServices"
          �[32m+�[0m�[0m default_action = "Deny"
        }
    }

�[1m  # module.key_vault_ingestion.azurerm_monitor_diagnostic_setting.diagnostic_setting_key_vault["0"]�[0m will be created
�[0m  �[32m+�[0m�[0m resource "azurerm_monitor_diagnostic_setting" "diagnostic_setting_key_vault" {
      �[32m+�[0m�[0m id                             = (known after apply)
      �[32m+�[0m�[0m log_analytics_destination_type = (known after apply)
      �[32m+�[0m�[0m log_analytics_workspace_id     = "/subscriptions/e82c5267-9dc4-4f45-ac13-abdd5e130d27/resourceGroups/ptt-dev-logging-rg/providers/Microsoft.OperationalInsights/workspaces/ptt-dev-log001"
      �[32m+�[0m�[0m name                           = "applicationLogs-0"
      �[32m+�[0m�[0m target_resource_id             = (known after apply)

      �[32m+�[0m�[0m enabled_log (known after apply)

      �[32m+�[0m�[0m metric (known after apply)
    }

�[1m  # module.key_vault_ingestion.azurerm_private_endpoint.private_endpoint_cognitive_account_vault�[0m will be created
�[0m  �[32m+�[0m�[0m resource "azurerm_private_endpoint" "private_endpoint_cognitive_account_vault" {
      �[32m+�[0m�[0m custom_dns_configs            = (known after apply)
      �[32m+�[0m�[0m custom_network_interface_name = "bfr-dev-ngst-kv001-vault-nic"
      �[32m+�[0m�[0m id                            = (known after apply)
      �[32m+�[0m�[0m location                      = "northeurope"
      �[32m+�[0m�[0m name                          = "bfr-dev-ngst-kv001-vault-pe"
      �[32m+�[0m�[0m network_interface             = (known after apply)
      �[32m+�[0m�[0m private_dns_zone_configs      = (known after apply)
      �[32m+�[0m�[0m resource_group_name           = "bfr-dev-bot-cnsm-rg"
      �[32m+�[0m�[0m subnet_id                     = "/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/ptt-dev-networking-rg/providers/Microsoft.Network/virtualNetworks/spoke-ptt-dev-vnet001/subnets/PrivateEndpointSubnetBot"
      �[32m+�[0m�[0m tags                          = {
          �[32m+�[0m�[0m "workload" = "bot-assistant"
        }

      �[32m+�[0m�[0m private_dns_zone_group {
          �[32m+�[0m�[0m id                   = (known after apply)
          �[32m+�[0m�[0m name                 = "bfr-dev-ngst-kv001-arecord"
          �[32m+�[0m�[0m private_dns_zone_ids = [
              �[32m+�[0m�[0m "/subscriptions/e82c5267-9dc4-4f45-ac13-abdd5e130d27/resourceGroups/ptt-dev-privatedns-rg/providers/Microsoft.Network/privateDnsZones/privatelink.vaultcore.azure.net",
            ]
        }

      �[32m+�[0m�[0m private_service_connection {
          �[32m+�[0m�[0m is_manual_connection           = false
          �[32m+�[0m�[0m name                           = "bfr-dev-ngst-kv001-vault-svc"
          �[32m+�[0m�[0m private_connection_resource_id = (known after apply)
          �[32m+�[0m�[0m private_ip_address             = (known after apply)
          �[32m+�[0m�[0m subresource_names              = [
              �[32m+�[0m�[0m "vault",
            ]
        }
    }

�[1m  # module.key_vault_ingestion.azurerm_role_assignment.current_roleassignment_key_vault�[0m will be created
�[0m  �[32m+�[0m�[0m resource "azurerm_role_assignment" "current_roleassignment_key_vault" {
      �[32m+�[0m�[0m id                               = (known after apply)
      �[32m+�[0m�[0m name                             = (known after apply)
      �[32m+�[0m�[0m principal_id                     = "973df2ad-4e5e-4e8b-9df6-17f61e9efd55"
      �[32m+�[0m�[0m principal_type                   = (known after apply)
      �[32m+�[0m�[0m role_definition_id               = (known after apply)
      �[32m+�[0m�[0m role_definition_name             = "Key Vault Administrator"
      �[32m+�[0m�[0m scope                            = (known after apply)
      �[32m+�[0m�[0m skip_service_principal_aad_check = (known after apply)
    }

�[1m  # module.key_vault_ingestion.time_sleep.sleep_connectivity�[0m will be created
�[0m  �[32m+�[0m�[0m resource "time_sleep" "sleep_connectivity" {
      �[32m+�[0m�[0m create_duration = "120s"
      �[32m+�[0m�[0m id              = (known after apply)
    }

�[1mPlan:�[0m 17 to add, 2 to change, 0 to destroy.
�[0m�[33m╷�[0m�[0m
�[33m│�[0m �[0m�[1m�[33mWarning: �[0m�[0m�[1mReference to undefined provider�[0m
�[33m│�[0m �[0m
�[33m│�[0m �[0m�[0m  on datafactory.tf line 6, in module "data_factory":
�[33m│�[0m �[0m   6:     �[4mtime�[0m    = time�[0m
�[33m│�[0m �[0m
�[33m│�[0m �[0mThere is no explicit declaration for local provider name "time" in
�[33m│�[0m �[0mmodule.data_factory, so Terraform is assuming you mean to pass a
�[33m│�[0m �[0mconfiguration for "hashicorp/time".
�[33m│�[0m �[0m
�[33m│�[0m �[0mIf you also control the child module, add a required_providers entry named
�[33m│�[0m �[0m"time" with the source address "hashicorp/time".
�[33m╵�[0m�[0m
�[90m
─────────────────────────────────────────────────────────────────────────────�[0m

Note: You didn't use the -out option to save this plan, so Terraform can't
guarantee to take exactly these actions if you run "terraform apply" now.
Releasing state lock. This may take a few moments...

@github-actions
Copy link

github-actions bot commented Nov 1, 2024

Terraform Lint Results

  • Terraform Version 📎1.9.8
  • Working Directory 📂./code/infra
  • Terraform Format and Style 🖌success

@github-actions
Copy link

github-actions bot commented Nov 1, 2024

Terraform Validation & Plan Results

  • Terraform Version 📎1.9.8
  • Working Directory 📂./code/infra
  • Terraform Initialization ⚙️success
  • Terraform Validation 🤖success
  • Terraform Plan 📖success
Show Plan

terraform
Acquiring state lock. This may take a few moments...
�[0m�[1mdata.local_file.file_system_prompt: Reading...�[0m�[0m
�[0m�[1mdata.local_file.file_system_prompt: Read complete after 0s [id=1b64caca607e392bc85ff27243e6022401cc3184]�[0m
�[0m�[1mdata.azurerm_log_analytics_workspace.log_analytics_workspace: Reading...�[0m�[0m
�[0m�[1mdata.azurerm_log_analytics_workspace.log_analytics_workspace: Read complete after 0s [id=/subscriptions/e82c5267-9dc4-4f45-ac13-abdd5e130d27/resourceGroups/ptt-dev-logging-rg/providers/Microsoft.OperationalInsights/workspaces/ptt-dev-log001]�[0m
�[0m�[1mazurerm_resource_group.resource_group_consumption: Refreshing state... [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/bfr-dev-bot-cnsm-rg]�[0m
�[0m�[1mdata.azurerm_virtual_network.virtual_network: Reading...�[0m�[0m
�[0m�[1mdata.azurerm_client_config.current: Reading...�[0m�[0m
�[0m�[1mmodule.key_vault_ingestion.data.azurerm_client_config.current: Reading...�[0m�[0m
�[0m�[1mmodule.storage_account.data.azurerm_client_config.current: Reading...�[0m�[0m
�[0m�[1mmodule.key_vault_consumption.data.azurerm_client_config.current: Reading...�[0m�[0m
�[0m�[1mdata.azurerm_route_table.route_table: Reading...�[0m�[0m
�[0m�[1mdata.azurerm_network_security_group.network_security_group: Reading...�[0m�[0m
�[0m�[1mmodule.azure_open_ai.data.azurerm_client_config.current: Reading...�[0m�[0m
�[0m�[1mazurerm_resource_group.resource_group_ingestion: Refreshing state... [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/bfr-dev-bot-ngst-rg]�[0m
�[0m�[1mmodule.storage_account.data.azurerm_client_config.current: Read complete after 0s [id=Y2xpZW50Q29uZmlncy9jbGllbnRJZD1lNWRmNjg0My1lYmRlLTRkNzktOWM3ZS03NDMxYTNjZDQzZDI7b2JqZWN0SWQ9OTczZGYyYWQtNGU1ZS00ZThiLTlkZjYtMTdmNjFlOWVmZDU1O3N1YnNjcmlwdGlvbklkPTFmZGFiMTE4LTE2MzgtNDE5YS04YjEyLTA2Yzk1NDM3MTRhMDt0ZW5hbnRJZD0zNzk2M2RkNC1mNGU2LTQwZjgtYTdkNi0yNGI5NzkxOWU0NTI=]�[0m
�[0m�[1mmodule.key_vault_ingestion.data.azurerm_client_config.current: Read complete after 0s [id=Y2xpZW50Q29uZmlncy9jbGllbnRJZD1lNWRmNjg0My1lYmRlLTRkNzktOWM3ZS03NDMxYTNjZDQzZDI7b2JqZWN0SWQ9OTczZGYyYWQtNGU1ZS00ZThiLTlkZjYtMTdmNjFlOWVmZDU1O3N1YnNjcmlwdGlvbklkPTFmZGFiMTE4LTE2MzgtNDE5YS04YjEyLTA2Yzk1NDM3MTRhMDt0ZW5hbnRJZD0zNzk2M2RkNC1mNGU2LTQwZjgtYTdkNi0yNGI5NzkxOWU0NTI=]�[0m
�[0m�[1mmodule.data_factory.data.azurerm_subscription.current: Reading...�[0m�[0m
�[0m�[1mmodule.key_vault_consumption.data.azurerm_client_config.current: Read complete after 0s [id=Y2xpZW50Q29uZmlncy9jbGllbnRJZD1lNWRmNjg0My1lYmRlLTRkNzktOWM3ZS03NDMxYTNjZDQzZDI7b2JqZWN0SWQ9OTczZGYyYWQtNGU1ZS00ZThiLTlkZjYtMTdmNjFlOWVmZDU1O3N1YnNjcmlwdGlvbklkPTFmZGFiMTE4LTE2MzgtNDE5YS04YjEyLTA2Yzk1NDM3MTRhMDt0ZW5hbnRJZD0zNzk2M2RkNC1mNGU2LTQwZjgtYTdkNi0yNGI5NzkxOWU0NTI=]�[0m
�[0m�[1mmodule.azure_open_ai.data.azurerm_client_config.current: Read complete after 0s [id=Y2xpZW50Q29uZmlncy9jbGllbnRJZD1lNWRmNjg0My1lYmRlLTRkNzktOWM3ZS03NDMxYTNjZDQzZDI7b2JqZWN0SWQ9OTczZGYyYWQtNGU1ZS00ZThiLTlkZjYtMTdmNjFlOWVmZDU1O3N1YnNjcmlwdGlvbklkPTFmZGFiMTE4LTE2MzgtNDE5YS04YjEyLTA2Yzk1NDM3MTRhMDt0ZW5hbnRJZD0zNzk2M2RkNC1mNGU2LTQwZjgtYTdkNi0yNGI5NzkxOWU0NTI=]�[0m
�[0m�[1mdata.azurerm_client_config.current: Read complete after 0s [id=Y2xpZW50Q29uZmlncy9jbGllbnRJZD1lNWRmNjg0My1lYmRlLTRkNzktOWM3ZS03NDMxYTNjZDQzZDI7b2JqZWN0SWQ9OTczZGYyYWQtNGU1ZS00ZThiLTlkZjYtMTdmNjFlOWVmZDU1O3N1YnNjcmlwdGlvbklkPTFmZGFiMTE4LTE2MzgtNDE5YS04YjEyLTA2Yzk1NDM3MTRhMDt0ZW5hbnRJZD0zNzk2M2RkNC1mNGU2LTQwZjgtYTdkNi0yNGI5NzkxOWU0NTI=]�[0m
�[0m�[1mmodule.data_factory.data.azurerm_subscription.current: Read complete after 1s [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0]�[0m
�[0m�[1mdata.azurerm_route_table.route_table: Read complete after 1s [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/ptt-dev-networking-rg/providers/Microsoft.Network/routeTables/ptt-dev-default-rt001]�[0m
�[0m�[1mmodule.azure_open_ai.azurerm_cognitive_account.cognitive_account: Refreshing state... [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/bfr-dev-bot-cnsm-rg/providers/Microsoft.CognitiveServices/accounts/bfr-dev-aoai001]�[0m
�[0m�[1mmodule.user_assigned_identity.azurerm_user_assigned_identity.user_assigned_identity: Refreshing state... [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/bfr-dev-bot-cnsm-rg/providers/Microsoft.ManagedIdentity/userAssignedIdentities/bfr-dev-uai001]�[0m
�[0m�[1mmodule.cosmosdb_account.azurerm_cosmosdb_account.cosmosdb_account: Refreshing state... [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/bfr-dev-bot-cnsm-rg/providers/Microsoft.DocumentDB/databaseAccounts/bfr-dev-cosmos001]�[0m
�[0m�[1mmodule.application_insights.azurerm_application_insights.application_insights: Refreshing state... [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/bfr-dev-bot-cnsm-rg/providers/Microsoft.Insights/components/bfr-dev-appi001]�[0m
�[0m�[1mmodule.app_service_plan.azurerm_service_plan.service_plan: Refreshing state... [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/bfr-dev-bot-cnsm-rg/providers/Microsoft.Web/serverFarms/bfr-dev-asp001]�[0m
�[0m�[1mdata.azurerm_network_security_group.network_security_group: Read complete after 1s [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/ptt-dev-networking-rg/providers/Microsoft.Network/networkSecurityGroups/ptt-dev-default-nsg001]�[0m
�[0m�[1mdata.azurerm_virtual_network.virtual_network: Read complete after 1s [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/ptt-dev-networking-rg/providers/Microsoft.Network/virtualNetworks/spoke-ptt-dev-vnet001]�[0m
�[0m�[1mazapi_resource.subnet_web_app: Refreshing state... [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/ptt-dev-networking-rg/providers/Microsoft.Network/virtualNetworks/spoke-ptt-dev-vnet001/subnets/WebAppSubnetBot]�[0m
�[0m�[1mmodule.data_factory.azurerm_data_factory.data_factory: Refreshing state... [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/bfr-dev-bot-ngst-rg/providers/Microsoft.DataFactory/factories/bfr-dev-adf001]�[0m
�[0m�[1mmodule.key_vault_ingestion.azurerm_key_vault.key_vault: Refreshing state... [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/bfr-dev-bot-cnsm-rg/providers/Microsoft.KeyVault/vaults/bfr-dev-ngst-kv001]�[0m
�[0m�[1mmodule.storage_account.azurerm_storage_account.storage_account: Refreshing state... [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/bfr-dev-bot-ngst-rg/providers/Microsoft.Storage/storageAccounts/bfrdevstg001]�[0m
�[0m�[1mmodule.app_service_plan.data.azurerm_monitor_diagnostic_categories.diagnostic_categories_service_plan: Reading...�[0m�[0m
�[0m�[1mmodule.azure_open_ai.data.azurerm_monitor_diagnostic_categories.diagnostic_categories_cognitive_account: Reading...�[0m�[0m
�[0m�[1mazurerm_role_assignment.uai_roleassignment_open_ai_contributor: Refreshing state... [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/bfr-dev-bot-cnsm-rg/providers/Microsoft.CognitiveServices/accounts/bfr-dev-aoai001/providers/Microsoft.Authorization/roleAssignments/e7e58016-b6f7-26e8-df5e-395cd83bd3d3]�[0m
�[0m�[1mazurerm_cognitive_deployment.cognitive_deployment_gpt_4o: Refreshing state... [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/bfr-dev-bot-cnsm-rg/providers/Microsoft.CognitiveServices/accounts/bfr-dev-aoai001/deployments/gpt-4o]�[0m
�[0m�[1mmodule.app_service_plan.data.azurerm_monitor_diagnostic_categories.diagnostic_categories_service_plan: Read complete after 0s [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/bfr-dev-bot-cnsm-rg/providers/Microsoft.Web/serverFarms/bfr-dev-asp001]�[0m
�[0m�[1mmodule.app_service_plan.azurerm_monitor_diagnostic_setting.diagnostic_setting_service_plan["0"]: Refreshing state... [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/bfr-dev-bot-cnsm-rg/providers/Microsoft.Web/serverFarms/bfr-dev-asp001|applicationLogs-0]�[0m
�[0m�[1mmodule.azure_open_ai.data.azurerm_monitor_diagnostic_categories.diagnostic_categories_cognitive_account: Read complete after 0s [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/bfr-dev-bot-cnsm-rg/providers/Microsoft.CognitiveServices/accounts/bfr-dev-aoai001]�[0m
�[0m�[1mmodule.azure_open_ai.azurerm_monitor_diagnostic_setting.diagnostic_setting_cognitive_account["0"]: Refreshing state... [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/bfr-dev-bot-cnsm-rg/providers/Microsoft.CognitiveServices/accounts/bfr-dev-aoai001|applicationLogs-0]�[0m
�[0m�[1mazapi_resource.subnet_private_endpoints: Refreshing state... [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/ptt-dev-networking-rg/providers/Microsoft.Network/virtualNetworks/spoke-ptt-dev-vnet001/subnets/PrivateEndpointSubnetBot]�[0m
�[0m�[1mmodule.key_vault_ingestion.azurerm_role_assignment.current_roleassignment_key_vault: Refreshing state... [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/bfr-dev-bot-cnsm-rg/providers/Microsoft.KeyVault/vaults/bfr-dev-ngst-kv001/providers/Microsoft.Authorization/roleAssignments/0e63b888-a849-dd09-507a-fb20f86099f4]�[0m
�[0m�[1mmodule.key_vault_ingestion.azurerm_monitor_diagnostic_setting.diagnostic_setting_key_vault["0"]: Refreshing state... [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/bfr-dev-bot-cnsm-rg/providers/Microsoft.KeyVault/vaults/bfr-dev-ngst-kv001|applicationLogs-0]�[0m
�[0m�[1mmodule.azure_open_ai.azurerm_private_endpoint.private_endpoint_cognitive_account: Refreshing state... [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/bfr-dev-bot-cnsm-rg/providers/Microsoft.Network/privateEndpoints/bfr-dev-aoai001-account-pe]�[0m
�[0m�[1mmodule.key_vault_ingestion.azurerm_private_endpoint.private_endpoint_cognitive_account_vault: Refreshing state... [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/bfr-dev-bot-cnsm-rg/providers/Microsoft.Network/privateEndpoints/bfr-dev-ngst-kv001-vault-pe]�[0m
�[0m�[1mmodule.cosmosdb_account.data.azurerm_monitor_diagnostic_categories.diagnostic_categories_cosmosdb_account: Reading...�[0m�[0m
�[0m�[1mmodule.cosmosdb_account.azurerm_private_endpoint.private_endpoint_cosmosdb_account["Sql"]: Refreshing state... [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/bfr-dev-bot-cnsm-rg/providers/Microsoft.Network/privateEndpoints/bfr-dev-cosmos001-Sql-pe]�[0m
�[0m�[1mazurerm_cosmosdb_sql_database.cosmosdb_sql_database: Refreshing state... [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/bfr-dev-bot-cnsm-rg/providers/Microsoft.DocumentDB/databaseAccounts/bfr-dev-cosmos001/sqlDatabases/BotDb]�[0m
�[0m�[1mmodule.cosmosdb_account.data.azurerm_monitor_diagnostic_categories.diagnostic_categories_cosmosdb_account: Read complete after 0s [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/bfr-dev-bot-cnsm-rg/providers/Microsoft.DocumentDB/databaseAccounts/bfr-dev-cosmos001]�[0m
�[0m�[1mmodule.data_factory.azurerm_private_endpoint.data_factory_private_endpoint_data_factory: Refreshing state... [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/bfr-dev-bot-ngst-rg/providers/Microsoft.Network/privateEndpoints/bfr-dev-adf001-datafactory-pe]�[0m
�[0m�[1mmodule.data_factory.data.azurerm_monitor_diagnostic_categories.diagnostic_categories_data_factory: Reading...�[0m�[0m
�[0m�[1mazurerm_role_assignment.data_factory_roleassignment_key_vault_secrets_user: Refreshing state... [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/bfr-dev-bot-cnsm-rg/providers/Microsoft.KeyVault/vaults/bfr-dev-ngst-kv001/providers/Microsoft.Authorization/roleAssignments/3cd1a978-d491-b683-c9cf-c20029ae54da]�[0m
�[0m�[1mmodule.data_factory.data.azurerm_monitor_diagnostic_categories.diagnostic_categories_data_factory: Read complete after 1s [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/bfr-dev-bot-ngst-rg/providers/Microsoft.DataFactory/factories/bfr-dev-adf001]�[0m
�[0m�[1mmodule.data_factory.azurerm_monitor_diagnostic_setting.diagnostic_setting_data_factory["0"]: Refreshing state... [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/bfr-dev-bot-ngst-rg/providers/Microsoft.DataFactory/factories/bfr-dev-adf001|applicationLogs-0]�[0m
�[0m�[1mmodule.key_vault_ingestion.time_sleep.sleep_connectivity: Refreshing state... [id=2024-10-31T18:34:33Z]�[0m
�[0m�[1mmodule.storage_account.data.azurerm_monitor_diagnostic_categories.diagnostic_categories_storage_account: Reading...�[0m�[0m
�[0m�[1mmodule.data_factory.azurerm_data_factory_managed_private_endpoint.data_factory_managed_private_endpoints["keyvault-vault"]: Refreshing state... [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/bfr-dev-bot-ngst-rg/providers/Microsoft.DataFactory/factories/bfr-dev-adf001/managedVirtualNetworks/default/managedPrivateEndpoints/keyvault-vault]�[0m
�[0m�[1mmodule.storage_account.azurerm_private_endpoint.private_endpoint_storage_account["blob"]: Refreshing state... [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/bfr-dev-bot-ngst-rg/providers/Microsoft.Network/privateEndpoints/bfrdevstg001-blob-pe]�[0m
�[0m�[1mmodule.data_factory.azurerm_data_factory_managed_private_endpoint.data_factory_managed_private_endpoints["storage-blob"]: Refreshing state... [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/bfr-dev-bot-ngst-rg/providers/Microsoft.DataFactory/factories/bfr-dev-adf001/managedVirtualNetworks/default/managedPrivateEndpoints/storage-blob]�[0m
�[0m�[1mmodule.storage_account.azurerm_role_assignment.current_roleassignment_storage_blob_data_owner: Refreshing state... [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/bfr-dev-bot-ngst-rg/providers/Microsoft.Storage/storageAccounts/bfrdevstg001/providers/Microsoft.Authorization/roleAssignments/1215bdd9-4b88-a75d-6e49-8ce3b5f7b8c4]�[0m
�[0m�[1mmodule.data_factory.time_sleep.sleep_connectivity: Refreshing state... [id=2024-10-31T17:20:12Z]�[0m
�[0m�[1mmodule.azure_open_ai.time_sleep.sleep_connectivity: Refreshing state... [id=2024-10-31T17:18:30Z]�[0m
�[0m�[1mmodule.storage_account.data.azurerm_monitor_diagnostic_categories.diagnostic_categories_storage_account: Read complete after 0s [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/bfr-dev-bot-ngst-rg/providers/Microsoft.Storage/storageAccounts/bfrdevstg001]�[0m
�[0m�[1mmodule.storage_account.azurerm_monitor_diagnostic_setting.diagnostic_setting_storage_account["0"]: Refreshing state... [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/bfr-dev-bot-ngst-rg/providers/Microsoft.Storage/storageAccounts/bfrdevstg001|applicationLogs-0]�[0m
�[0m�[1mmodule.data_factory.null_resource.data_factory_managed_private_endpoint_storage_blob_approval["storage-blob"]: Refreshing state... [id=3598196814143573114]�[0m
�[0m�[1mmodule.data_factory.null_resource.data_factory_managed_private_endpoint_storage_blob_approval["keyvault-vault"]: Refreshing state... [id=6794112361542543112]�[0m
�[0m�[1mmodule.cosmosdb_account.time_sleep.sleep_connectivity: Refreshing state... [id=2024-10-31T17:29:41Z]�[0m
�[0m�[1mmodule.application_insights.data.azurerm_monitor_diagnostic_categories.diagnostic_categories_application_insights: Reading...�[0m�[0m
�[0m�[1mmodule.bot_service.data.azurerm_application_insights.application_insights: Reading...�[0m�[0m
�[0m�[1mazurerm_linux_web_app.linux_web_app: Refreshing state... [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/bfr-dev-bot-cnsm-rg/providers/Microsoft.Web/sites/bfr-dev-app001]�[0m
�[0m�[1mmodule.application_insights.data.azurerm_monitor_diagnostic_categories.diagnostic_categories_application_insights: Read complete after 0s [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/bfr-dev-bot-cnsm-rg/providers/Microsoft.Insights/components/bfr-dev-appi001]�[0m
�[0m�[1mmodule.application_insights.azurerm_monitor_diagnostic_setting.diagnostic_setting_application_insights["0"]: Refreshing state... [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/bfr-dev-bot-cnsm-rg/providers/Microsoft.Insights/components/bfr-dev-appi001|applicationLogs-0]�[0m
�[0m�[1mmodule.storage_account.time_sleep.sleep_connectivity: Refreshing state... [id=2024-10-31T17:21:04Z]�[0m
�[0m�[1mmodule.storage_account.azurerm_storage_container.storage_container["curated"]: Refreshing state... [id=https://bfrdevstg001.blob.core.windows.net/curated]�[0m
�[0m�[1mmodule.storage_account.azurerm_storage_container.storage_container["raw"]: Refreshing state... [id=https://bfrdevstg001.blob.core.windows.net/raw]�[0m
�[0m�[1mmodule.bot_service.data.azurerm_application_insights.application_insights: Read complete after 1s [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/bfr-dev-bot-cnsm-rg/providers/Microsoft.Insights/components/bfr-dev-appi001]�[0m
�[0m�[1mazurerm_private_endpoint.linux_web_app_private_endpoint: Refreshing state... [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/bfr-dev-bot-cnsm-rg/providers/Microsoft.Network/privateEndpoints/bfr-dev-app001-pe]�[0m
�[0m�[1mmodule.bot_service.azurerm_bot_service_azure_bot.bot_service_azure_bot: Refreshing state... [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/bfr-dev-bot-cnsm-rg/providers/Microsoft.BotService/botServices/bfr-dev-bot001]�[0m
�[0m�[1mazurerm_monitor_diagnostic_setting.diagnostic_setting_linux_web_app: Refreshing state... [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/bfr-dev-bot-cnsm-rg/providers/Microsoft.Web/sites/bfr-dev-app001|logAnalytics]�[0m
�[0m�[1mazurerm_bot_connection.bot_connection_aadv2_oauth: Refreshing state... [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/bfr-dev-bot-cnsm-rg/providers/Microsoft.BotService/botServices/bfr-dev-bot001/connections/aadv2-oauth]�[0m
�[0m�[1mmodule.bot_service.data.azurerm_monitor_diagnostic_categories.diagnostic_categories_bot_service_azure_bot: Reading...�[0m�[0m
�[0m�[1mmodule.bot_service.azurerm_private_endpoint.bot_service_azure_bot_private_endpoint_bot: Refreshing state... [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/bfr-dev-bot-cnsm-rg/providers/Microsoft.Network/privateEndpoints/bfr-dev-bot001-bot-pe]�[0m
�[0m�[1mmodule.bot_service.azurerm_private_endpoint.bot_service_azure_bot_private_endpoint_token: Refreshing state... [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/bfr-dev-bot-cnsm-rg/providers/Microsoft.Network/privateEndpoints/bfr-dev-bot001-token-pe]�[0m
�[0m�[1mmodule.bot_service.data.azurerm_monitor_diagnostic_categories.diagnostic_categories_bot_service_azure_bot: Read complete after 0s [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/bfr-dev-bot-cnsm-rg/providers/Microsoft.BotService/botServices/bfr-dev-bot001]�[0m
�[0m�[1mmodule.bot_service.azurerm_monitor_diagnostic_setting.diagnostic_setting_bot_service_azure_bot["0"]: Refreshing state... [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/bfr-dev-bot-cnsm-rg/providers/Microsoft.BotService/botServices/bfr-dev-bot001|applicationLogs-0]�[0m
�[0m�[1mmodule.bot_service.time_sleep.sleep_connectivity: Refreshing state... [id=2024-10-31T17:24:36Z]�[0m

Terraform used the selected providers to generate the following execution
plan. Resource actions are indicated with the following symbols:
  �[32m+�[0m create�[0m
  �[33m~�[0m update in-place�[0m
�[31m-�[0m/�[32m+�[0m destroy and then create replacement�[0m
 �[36m<=�[0m read (data resources)�[0m

Terraform will perform the following actions:

�[1m  # data.azurerm_monitor_diagnostic_categories.diagnostic_categories_linux_web_app�[0m will be read during apply
  # (depends on a resource or a module with changes pending)
�[0m �[36m<=�[0m�[0m data "azurerm_monitor_diagnostic_categories" "diagnostic_categories_linux_web_app" {
      �[32m+�[0m�[0m id                  = (known after apply)
      �[32m+�[0m�[0m log_category_groups = (known after apply)
      �[32m+�[0m�[0m log_category_types  = (known after apply)
      �[32m+�[0m�[0m metrics             = (known after apply)
      �[32m+�[0m�[0m resource_id         = "/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/bfr-dev-bot-cnsm-rg/providers/Microsoft.Web/sites/bfr-dev-app001"
    }

�[1m  # azurerm_linux_web_app.linux_web_app�[0m will be updated in-place
�[0m  �[33m~�[0m�[0m resource "azurerm_linux_web_app" "linux_web_app" {
      �[33m~�[0m�[0m app_settings                                   = {
          �[33m~�[0m�[0m "AZURE_OPENAI_SYSTEM_PROMPT"                 = <<-EOT
                You are a world-class assistant who tells jokes. For anything but jokes, respond politely that you are just trying to make everyone’s life a happier place.
            EOT
            �[90m# (18 unchanged elements hidden)�[0m�[0m
        }
        id                                             = "/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/bfr-dev-bot-cnsm-rg/providers/Microsoft.Web/sites/bfr-dev-app001"
        name                                           = "bfr-dev-app001"
      �[33m~�[0m�[0m tags                                           = {
          �[31m-�[0m�[0m "hidden-link: /app-insights-conn-string"         = "InstrumentationKey=8c258cf1-6599-4bb3-b58e-261551cd8e49;IngestionEndpoint=https://northeurope-2.in.applicationinsights.azure.com/;LiveEndpoint=https://northeurope.livediagnostics.monitor.azure.com/;ApplicationId=a5380070-9e03-49b6-bd56-7d4218d71506" �[90m-> null�[0m�[0m
          �[31m-�[0m�[0m "hidden-link: /app-insights-instrumentation-key" = "8c258cf1-6599-4bb3-b58e-261551cd8e49" �[90m-> null�[0m�[0m
          �[31m-�[0m�[0m "hidden-link: /app-insights-resource-id"         = "/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/bfr-dev-bot-cnsm-rg/providers/microsoft.insights/components/bfr-dev-appi001" �[90m-> null�[0m�[0m
            "workload"                                       = "bot-assistant"
        }
        �[90m# (24 unchanged attributes hidden)�[0m�[0m

        �[90m# (2 unchanged blocks hidden)�[0m�[0m
    }

�[1m  # azurerm_monitor_diagnostic_setting.diagnostic_setting_linux_web_app�[0m will be updated in-place
�[0m  �[33m~�[0m�[0m resource "azurerm_monitor_diagnostic_setting" "diagnostic_setting_linux_web_app" {
        id                             = "/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/bfr-dev-bot-cnsm-rg/providers/Microsoft.Web/sites/bfr-dev-app001|logAnalytics"
        name                           = "logAnalytics"
        �[90m# (5 unchanged attributes hidden)�[0m�[0m

      �[33m~�[0m�[0m enabled_log (known after apply)
      �[31m-�[0m�[0m enabled_log {
          �[31m-�[0m�[0m category_group = "allLogs" �[90m-> null�[0m�[0m
            �[90m# (1 unchanged attribute hidden)�[0m�[0m

          �[31m-�[0m�[0m retention_policy {
              �[31m-�[0m�[0m days    = 0 �[90m-> null�[0m�[0m
              �[31m-�[0m�[0m enabled = false �[90m-> null�[0m�[0m
            }
        }
      �[31m-�[0m�[0m enabled_log {
          �[31m-�[0m�[0m category_group = "audit" �[90m-> null�[0m�[0m
            �[90m# (1 unchanged attribute hidden)�[0m�[0m

          �[31m-�[0m�[0m retention_policy {
              �[31m-�[0m�[0m days    = 0 �[90m-> null�[0m�[0m
              �[31m-�[0m�[0m enabled = false �[90m-> null�[0m�[0m
            }
        }

      �[33m~�[0m�[0m metric (known after apply)
      �[31m-�[0m�[0m metric {
          �[31m-�[0m�[0m category = "AllMetrics" �[90m-> null�[0m�[0m
          �[31m-�[0m�[0m enabled  = true �[90m-> null�[0m�[0m

          �[31m-�[0m�[0m retention_policy {
              �[31m-�[0m�[0m days    = 0 �[90m-> null�[0m�[0m
              �[31m-�[0m�[0m enabled = false �[90m-> null�[0m�[0m
            }
        }
    }

�[1m  # azurerm_role_assignment.data_factory_roleassignment_key_vault_secrets_user�[0m must be �[1m�[31mreplaced�[0m
�[0m�[31m-�[0m/�[32m+�[0m�[0m resource "azurerm_role_assignment" "data_factory_roleassignment_key_vault_secrets_user" {
      �[33m~�[0m�[0m id                                     = "/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/bfr-dev-bot-cnsm-rg/providers/Microsoft.KeyVault/vaults/bfr-dev-ngst-kv001/providers/Microsoft.Authorization/roleAssignments/3cd1a978-d491-b683-c9cf-c20029ae54da" -> (known after apply)
      �[33m~�[0m�[0m name                                   = "3cd1a978-d491-b683-c9cf-c20029ae54da" -> (known after apply)
      �[33m~�[0m�[0m role_definition_id                     = "/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/providers/Microsoft.Authorization/roleDefinitions/4633458b-17de-408a-b874-0445c86b69e6" -> (known after apply)
      �[33m~�[0m�[0m scope                                  = "/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/bfr-dev-bot-cnsm-rg/providers/Microsoft.KeyVault/vaults/bfr-dev-ngst-kv001" -> (known after apply) �[31m# forces replacement�[0m�[0m
      �[32m+�[0m�[0m skip_service_principal_aad_check       = (known after apply)
        �[90m# (7 unchanged attributes hidden)�[0m�[0m
    }

�[1m  # azurerm_role_assignment.data_factory_roleassignment_storage_blob_data_owner�[0m will be created
�[0m  �[32m+�[0m�[0m resource "azurerm_role_assignment" "data_factory_roleassignment_storage_blob_data_owner" {
      �[32m+�[0m�[0m description                      = "Required for reding and writing data from data factory."
      �[32m+�[0m�[0m id                               = (known after apply)
      �[32m+�[0m�[0m name                             = (known after apply)
      �[32m+�[0m�[0m principal_id                     = "c464b453-4a51-4fd1-929e-6c8e17dc8da7"
      �[32m+�[0m�[0m principal_type                   = "ServicePrincipal"
      �[32m+�[0m�[0m role_definition_id               = (known after apply)
      �[32m+�[0m�[0m role_definition_name             = "Storage Account Owner"
      �[32m+�[0m�[0m scope                            = "/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/bfr-dev-bot-ngst-rg/providers/Microsoft.Storage/storageAccounts/bfrdevstg001"
      �[32m+�[0m�[0m skip_service_principal_aad_check = (known after apply)
    }

�[1m  # azurerm_role_assignment.uai_roleassignment_key_vault_secrets_user�[0m will be created
�[0m  �[32m+�[0m�[0m resource "azurerm_role_assignment" "uai_roleassignment_key_vault_secrets_user" {
      �[32m+�[0m�[0m description                      = "Required for accessing secrets in the key vault from teh web app app settings."
      �[32m+�[0m�[0m id                               = (known after apply)
      �[32m+�[0m�[0m name                             = (known after apply)
      �[32m+�[0m�[0m principal_id                     = "3df57092-2e4d-45a8-9a9f-6d37abccdb39"
      �[32m+�[0m�[0m principal_type                   = "ServicePrincipal"
      �[32m+�[0m�[0m role_definition_id               = (known after apply)
      �[32m+�[0m�[0m role_definition_name             = "Key Vault Secrets User"
      �[32m+�[0m�[0m scope                            = (known after apply)
      �[32m+�[0m�[0m skip_service_principal_aad_check = (known after apply)
    }

�[1m  # module.data_factory.azurerm_data_factory_managed_private_endpoint.data_factory_managed_private_endpoints["keyvault-vault"]�[0m must be �[1m�[31mreplaced�[0m
�[0m�[31m-�[0m/�[32m+�[0m�[0m resource "azurerm_data_factory_managed_private_endpoint" "data_factory_managed_private_endpoints" {
      �[33m~�[0m�[0m fqdns              = [
          �[31m-�[0m�[0m "bfr-dev-ngst-kv001.vault.azure.net",
        ] -> (known after apply)
      �[33m~�[0m�[0m id                 = "/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/bfr-dev-bot-ngst-rg/providers/Microsoft.DataFactory/factories/bfr-dev-adf001/managedVirtualNetworks/default/managedPrivateEndpoints/keyvault-vault" -> (known after apply)
        name               = "keyvault-vault"
      �[33m~�[0m�[0m target_resource_id = "/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/bfr-dev-bot-cnsm-rg/providers/Microsoft.KeyVault/vaults/bfr-dev-ngst-kv001" -> (known after apply) �[31m# forces replacement�[0m�[0m
        �[90m# (2 unchanged attributes hidden)�[0m�[0m
    }

�[1m  # module.data_factory.null_resource.data_factory_managed_private_endpoint_storage_blob_approval["keyvault-vault"]�[0m is tainted, so must be �[1m�[31mreplaced�[0m
�[0m�[31m-�[0m/�[32m+�[0m�[0m resource "null_resource" "data_factory_managed_private_endpoint_storage_blob_approval" {
      �[33m~�[0m�[0m id       = "6794112361542543112" -> (known after apply)
        �[90m# (1 unchanged attribute hidden)�[0m�[0m
    }

�[1m  # module.data_factory.null_resource.data_factory_managed_private_endpoint_storage_blob_approval["storage-blob"]�[0m is tainted, so must be �[1m�[31mreplaced�[0m
�[0m�[31m-�[0m/�[32m+�[0m�[0m resource "null_resource" "data_factory_managed_private_endpoint_storage_blob_approval" {
      �[33m~�[0m�[0m id       = "3598196814143573114" -> (known after apply)
        �[90m# (1 unchanged attribute hidden)�[0m�[0m
    }

�[1m  # module.key_vault_consumption.data.azurerm_monitor_diagnostic_categories.diagnostic_categories_key_vault�[0m will be read during apply
  # (config refers to values not yet known)
�[0m �[36m<=�[0m�[0m data "azurerm_monitor_diagnostic_categories" "diagnostic_categories_key_vault" {
      �[32m+�[0m�[0m id                  = (known after apply)
      �[32m+�[0m�[0m log_category_groups = (known after apply)
      �[32m+�[0m�[0m log_category_types  = (known after apply)
      �[32m+�[0m�[0m metrics             = (known after apply)
      �[32m+�[0m�[0m resource_id         = (known after apply)
    }

�[1m  # module.key_vault_consumption.azurerm_key_vault.key_vault�[0m will be created
�[0m  �[32m+�[0m�[0m resource "azurerm_key_vault" "key_vault" {
      �[32m+�[0m�[0m access_policy                   = []
      �[32m+�[0m�[0m enable_rbac_authorization       = true
      �[32m+�[0m�[0m enabled_for_deployment          = false
      �[32m+�[0m�[0m enabled_for_disk_encryption     = false
      �[32m+�[0m�[0m enabled_for_template_deployment = false
      �[32m+�[0m�[0m id                              = (known after apply)
      �[32m+�[0m�[0m location                        = "northeurope"
      �[32m+�[0m�[0m name                            = "bfr-dev-kv001"
      �[32m+�[0m�[0m public_network_access_enabled   = false
      �[32m+�[0m�[0m purge_protection_enabled        = true
      �[32m+�[0m�[0m resource_group_name             = "bfr-dev-bot-cnsm-rg"
      �[32m+�[0m�[0m sku_name                        = "standard"
      �[32m+�[0m�[0m soft_delete_retention_days      = 7
      �[32m+�[0m�[0m tags                            = {
          �[32m+�[0m�[0m "workload" = "bot-assistant"
        }
      �[32m+�[0m�[0m tenant_id                       = "37963dd4-f4e6-40f8-a7d6-24b97919e452"
      �[32m+�[0m�[0m vault_uri                       = (known after apply)

      �[32m+�[0m�[0m contact (known after apply)

      �[32m+�[0m�[0m network_acls {
          �[32m+�[0m�[0m bypass         = "AzureServices"
          �[32m+�[0m�[0m default_action = "Deny"
        }
    }

�[1m  # module.key_vault_consumption.azurerm_monitor_diagnostic_setting.diagnostic_setting_key_vault["0"]�[0m will be created
�[0m  �[32m+�[0m�[0m resource "azurerm_monitor_diagnostic_setting" "diagnostic_setting_key_vault" {
      �[32m+�[0m�[0m id                             = (known after apply)
      �[32m+�[0m�[0m log_analytics_destination_type = (known after apply)
      �[32m+�[0m�[0m log_analytics_workspace_id     = "/subscriptions/e82c5267-9dc4-4f45-ac13-abdd5e130d27/resourceGroups/ptt-dev-logging-rg/providers/Microsoft.OperationalInsights/workspaces/ptt-dev-log001"
      �[32m+�[0m�[0m name                           = "applicationLogs-0"
      �[32m+�[0m�[0m target_resource_id             = (known after apply)

      �[32m+�[0m�[0m enabled_log (known after apply)

      �[32m+�[0m�[0m metric (known after apply)
    }

�[1m  # module.key_vault_consumption.azurerm_private_endpoint.private_endpoint_cognitive_account_vault�[0m will be created
�[0m  �[32m+�[0m�[0m resource "azurerm_private_endpoint" "private_endpoint_cognitive_account_vault" {
      �[32m+�[0m�[0m custom_dns_configs            = (known after apply)
      �[32m+�[0m�[0m custom_network_interface_name = "bfr-dev-kv001-vault-nic"
      �[32m+�[0m�[0m id                            = (known after apply)
      �[32m+�[0m�[0m location                      = "northeurope"
      �[32m+�[0m�[0m name                          = "bfr-dev-kv001-vault-pe"
      �[32m+�[0m�[0m network_interface             = (known after apply)
      �[32m+�[0m�[0m private_dns_zone_configs      = (known after apply)
      �[32m+�[0m�[0m resource_group_name           = "bfr-dev-bot-cnsm-rg"
      �[32m+�[0m�[0m subnet_id                     = "/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/ptt-dev-networking-rg/providers/Microsoft.Network/virtualNetworks/spoke-ptt-dev-vnet001/subnets/PrivateEndpointSubnetBot"
      �[32m+�[0m�[0m tags                          = {
          �[32m+�[0m�[0m "workload" = "bot-assistant"
        }

      �[32m+�[0m�[0m private_dns_zone_group {
          �[32m+�[0m�[0m id                   = (known after apply)
          �[32m+�[0m�[0m name                 = "bfr-dev-kv001-arecord"
          �[32m+�[0m�[0m private_dns_zone_ids = [
              �[32m+�[0m�[0m "/subscriptions/e82c5267-9dc4-4f45-ac13-abdd5e130d27/resourceGroups/ptt-dev-privatedns-rg/providers/Microsoft.Network/privateDnsZones/privatelink.vaultcore.azure.net",
            ]
        }

      �[32m+�[0m�[0m private_service_connection {
          �[32m+�[0m�[0m is_manual_connection           = false
          �[32m+�[0m�[0m name                           = "bfr-dev-kv001-vault-svc"
          �[32m+�[0m�[0m private_connection_resource_id = (known after apply)
          �[32m+�[0m�[0m private_ip_address             = (known after apply)
          �[32m+�[0m�[0m subresource_names              = [
              �[32m+�[0m�[0m "vault",
            ]
        }
    }

�[1m  # module.key_vault_consumption.azurerm_role_assignment.current_roleassignment_key_vault�[0m will be created
�[0m  �[32m+�[0m�[0m resource "azurerm_role_assignment" "current_roleassignment_key_vault" {
      �[32m+�[0m�[0m id                               = (known after apply)
      �[32m+�[0m�[0m name                             = (known after apply)
      �[32m+�[0m�[0m principal_id                     = "973df2ad-4e5e-4e8b-9df6-17f61e9efd55"
      �[32m+�[0m�[0m principal_type                   = (known after apply)
      �[32m+�[0m�[0m role_definition_id               = (known after apply)
      �[32m+�[0m�[0m role_definition_name             = "Key Vault Administrator"
      �[32m+�[0m�[0m scope                            = (known after apply)
      �[32m+�[0m�[0m skip_service_principal_aad_check = (known after apply)
    }

�[1m  # module.key_vault_consumption.time_sleep.sleep_connectivity�[0m will be created
�[0m  �[32m+�[0m�[0m resource "time_sleep" "sleep_connectivity" {
      �[32m+�[0m�[0m create_duration = "120s"
      �[32m+�[0m�[0m id              = (known after apply)
    }

�[1m  # module.key_vault_ingestion.data.azurerm_monitor_diagnostic_categories.diagnostic_categories_key_vault�[0m will be read during apply
  # (config refers to values not yet known)
�[0m �[36m<=�[0m�[0m data "azurerm_monitor_diagnostic_categories" "diagnostic_categories_key_vault" {
      �[32m+�[0m�[0m id                  = (known after apply)
      �[32m+�[0m�[0m log_category_groups = (known after apply)
      �[32m+�[0m�[0m log_category_types  = (known after apply)
      �[32m+�[0m�[0m metrics             = (known after apply)
      �[32m+�[0m�[0m resource_id         = (known after apply)
    }

�[1m  # module.key_vault_ingestion.azurerm_key_vault.key_vault�[0m must be �[1m�[31mreplaced�[0m
�[0m�[31m-�[0m/�[32m+�[0m�[0m resource "azurerm_key_vault" "key_vault" {
      �[33m~�[0m�[0m id                              = "/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/bfr-dev-bot-cnsm-rg/providers/Microsoft.KeyVault/vaults/bfr-dev-ngst-kv001" -> (known after apply)
        name                            = "bfr-dev-ngst-kv001"
      �[33m~�[0m�[0m resource_group_name             = "bfr-dev-bot-cnsm-rg" �[33m->�[0m�[0m "bfr-dev-bot-ngst-rg" �[31m# forces replacement�[0m�[0m
        tags                            = {
            "workload" = "bot-assistant"
        }
      �[33m~�[0m�[0m vault_uri                       = "https://bfr-dev-ngst-kv001.vault.azure.net/" -> (known after apply)
        �[90m# (11 unchanged attributes hidden)�[0m�[0m

      �[33m~�[0m�[0m contact (known after apply)

      �[33m~�[0m�[0m network_acls {
          �[31m-�[0m�[0m ip_rules                   = [] �[90m-> null�[0m�[0m
          �[31m-�[0m�[0m virtual_network_subnet_ids = [] �[90m-> null�[0m�[0m
            �[90m# (2 unchanged attributes hidden)�[0m�[0m
        }
    }

�[1m  # module.key_vault_ingestion.azurerm_monitor_diagnostic_setting.diagnostic_setting_key_vault["0"]�[0m must be �[1m�[31mreplaced�[0m
�[0m�[31m-�[0m/�[32m+�[0m�[0m resource "azurerm_monitor_diagnostic_setting" "diagnostic_setting_key_vault" {
      �[33m~�[0m�[0m id                             = "/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/bfr-dev-bot-cnsm-rg/providers/Microsoft.KeyVault/vaults/bfr-dev-ngst-kv001|applicationLogs-0" -> (known after apply)
      �[33m~�[0m�[0m log_analytics_destination_type = "AzureDiagnostics" -> (known after apply)
        name                           = "applicationLogs-0"
      �[33m~�[0m�[0m target_resource_id             = "/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/bfr-dev-bot-cnsm-rg/providers/Microsoft.KeyVault/vaults/bfr-dev-ngst-kv001" -> (known after apply) �[31m# forces replacement�[0m�[0m
        �[90m# (3 unchanged attributes hidden)�[0m�[0m

      �[33m~�[0m�[0m enabled_log (known after apply)
      �[31m-�[0m�[0m enabled_log {
          �[31m-�[0m�[0m category_group = "allLogs" �[90m-> null�[0m�[0m
            �[90m# (1 unchanged attribute hidden)�[0m�[0m

          �[31m-�[0m�[0m retention_policy {
              �[31m-�[0m�[0m days    = 0 �[90m-> null�[0m�[0m
              �[31m-�[0m�[0m enabled = false �[90m-> null�[0m�[0m
            }
        }
      �[31m-�[0m�[0m enabled_log {
          �[31m-�[0m�[0m category_group = "audit" �[90m-> null�[0m�[0m
            �[90m# (1 unchanged attribute hidden)�[0m�[0m

          �[31m-�[0m�[0m retention_policy {
              �[31m-�[0m�[0m days    = 0 �[90m-> null�[0m�[0m
              �[31m-�[0m�[0m enabled = false �[90m-> null�[0m�[0m
            }
        }

      �[33m~�[0m�[0m metric (known after apply)
      �[31m-�[0m�[0m metric {
          �[31m-�[0m�[0m category = "AllMetrics" �[90m-> null�[0m�[0m
          �[31m-�[0m�[0m enabled  = true �[90m-> null�[0m�[0m

          �[31m-�[0m�[0m retention_policy {
              �[31m-�[0m�[0m days    = 0 �[90m-> null�[0m�[0m
              �[31m-�[0m�[0m enabled = false �[90m-> null�[0m�[0m
            }
        }
    }

�[1m  # module.key_vault_ingestion.azurerm_private_endpoint.private_endpoint_cognitive_account_vault�[0m must be �[1m�[31mreplaced�[0m
�[0m�[31m-�[0m/�[32m+�[0m�[0m resource "azurerm_private_endpoint" "private_endpoint_cognitive_account_vault" {
      �[33m~�[0m�[0m custom_dns_configs            = [] -> (known after apply)
      �[33m~�[0m�[0m id                            = "/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/bfr-dev-bot-cnsm-rg/providers/Microsoft.Network/privateEndpoints/bfr-dev-ngst-kv001-vault-pe" -> (known after apply)
        name                          = "bfr-dev-ngst-kv001-vault-pe"
      �[33m~�[0m�[0m network_interface             = [
          �[31m-�[0m�[0m {
              �[31m-�[0m�[0m id   = "/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/bfr-dev-bot-cnsm-rg/providers/Microsoft.Network/networkInterfaces/bfr-dev-ngst-kv001-vault-nic"
              �[31m-�[0m�[0m name = "bfr-dev-ngst-kv001-vault-nic"
            },
        ] -> (known after apply)
      �[33m~�[0m�[0m private_dns_zone_configs      = [
          �[31m-�[0m�[0m {
              �[31m-�[0m�[0m id                  = "/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/bfr-dev-bot-cnsm-rg/providers/Microsoft.Network/privateEndpoints/bfr-dev-ngst-kv001-vault-pe/privateDnsZoneGroups/bfr-dev-ngst-kv001-arecord/privateDnsZoneConfigs/privatelink.vaultcore.azure.net"
              �[31m-�[0m�[0m name                = "privatelink.vaultcore.azure.net"
              �[31m-�[0m�[0m private_dns_zone_id = "/subscriptions/e82c5267-9dc4-4f45-ac13-abdd5e130d27/resourceGroups/ptt-dev-privatedns-rg/providers/Microsoft.Network/privateDnsZones/privatelink.vaultcore.azure.net"
              �[31m-�[0m�[0m record_sets         = [
                  �[31m-�[0m�[0m {
                      �[31m-�[0m�[0m fqdn         = "bfr-dev-ngst-kv001.privatelink.vaultcore.azure.net"
                      �[31m-�[0m�[0m ip_addresses = [
                          �[31m-�[0m�[0m "10.3.2.12",
                        ]
                      �[31m-�[0m�[0m name         = "bfr-dev-ngst-kv001"
                      �[31m-�[0m�[0m ttl          = 10
                      �[31m-�[0m�[0m type         = "A"
                    },
                ]
            },
        ] -> (known after apply)
      �[33m~�[0m�[0m resource_group_name           = "bfr-dev-bot-cnsm-rg" �[33m->�[0m�[0m "bfr-dev-bot-ngst-rg" �[31m# forces replacement�[0m�[0m
        tags                          = {
            "workload" = "bot-assistant"
        }
        �[90m# (3 unchanged attributes hidden)�[0m�[0m

      �[33m~�[0m�[0m private_dns_zone_group {
          �[33m~�[0m�[0m id                   = "/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/bfr-dev-bot-cnsm-rg/providers/Microsoft.Network/privateEndpoints/bfr-dev-ngst-kv001-vault-pe/privateDnsZoneGroups/bfr-dev-ngst-kv001-arecord" -> (known after apply)
            name                 = "bfr-dev-ngst-kv001-arecord"
            �[90m# (1 unchanged attribute hidden)�[0m�[0m
        }

      �[33m~�[0m�[0m private_service_connection {
            name                              = "bfr-dev-ngst-kv001-vault-svc"
          �[33m~�[0m�[0m private_connection_resource_id    = "/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/bfr-dev-bot-cnsm-rg/providers/Microsoft.KeyVault/vaults/bfr-dev-ngst-kv001" -> (known after apply) �[31m# forces replacement�[0m�[0m
          �[33m~�[0m�[0m private_ip_address                = "10.3.2.12" -> (known after apply)
            �[90m# (4 unchanged attributes hidden)�[0m�[0m
        }
    }

�[1m  # module.key_vault_ingestion.azurerm_role_assignment.current_roleassignment_key_vault�[0m must be �[1m�[31mreplaced�[0m
�[0m�[31m-�[0m/�[32m+�[0m�[0m resource "azurerm_role_assignment" "current_roleassignment_key_vault" {
      �[33m~�[0m�[0m id                                     = "/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/bfr-dev-bot-cnsm-rg/providers/Microsoft.KeyVault/vaults/bfr-dev-ngst-kv001/providers/Microsoft.Authorization/roleAssignments/0e63b888-a849-dd09-507a-fb20f86099f4" -> (known after apply)
      �[33m~�[0m�[0m name                                   = "0e63b888-a849-dd09-507a-fb20f86099f4" -> (known after apply)
      �[33m~�[0m�[0m principal_type                         = "ServicePrincipal" -> (known after apply)
      �[33m~�[0m�[0m role_definition_id                     = "/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/providers/Microsoft.Authorization/roleDefinitions/00482a5a-887f-4fb3-b363-3b7fe8e74483" -> (known after apply)
      �[33m~�[0m�[0m scope                                  = "/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/bfr-dev-bot-cnsm-rg/providers/Microsoft.KeyVault/vaults/bfr-dev-ngst-kv001" -> (known after apply) �[31m# forces replacement�[0m�[0m
      �[32m+�[0m�[0m skip_service_principal_aad_check       = (known after apply)
        �[90m# (6 unchanged attributes hidden)�[0m�[0m
    }

�[1mPlan:�[0m 15 to add, 2 to change, 8 to destroy.
�[0m�[33m╷�[0m�[0m
�[33m│�[0m �[0m�[1m�[33mWarning: �[0m�[0m�[1mReference to undefined provider�[0m
�[33m│�[0m �[0m
�[33m│�[0m �[0m�[0m  on datafactory.tf line 6, in module "data_factory":
�[33m│�[0m �[0m   6:     �[4mtime�[0m    = time�[0m
�[33m│�[0m �[0m
�[33m│�[0m �[0mThere is no explicit declaration for local provider name "time" in
�[33m│�[0m �[0mmodule.data_factory, so Terraform is assuming you mean to pass a
�[33m│�[0m �[0mconfiguration for "hashicorp/time".
�[33m│�[0m �[0m
�[33m│�[0m �[0mIf you also control the child module, add a required_providers entry named
�[33m│�[0m �[0m"time" with the source address "hashicorp/time".
�[33m╵�[0m�[0m
�[90m
─────────────────────────────────────────────────────────────────────────────�[0m

Note: You didn't use the -out option to save this plan, so Terraform can't
guarantee to take exactly these actions if you run "terraform apply" now.
Releasing state lock. This may take a few moments...

@github-actions
Copy link

github-actions bot commented Nov 1, 2024

Terraform Lint Results

  • Terraform Version 📎1.9.8
  • Working Directory 📂./code/infra
  • Terraform Format and Style 🖌success

@github-actions
Copy link

github-actions bot commented Nov 1, 2024

Terraform Validation & Plan Results

  • Terraform Version 📎1.9.8
  • Working Directory 📂./code/infra
  • Terraform Initialization ⚙️success
  • Terraform Validation 🤖success
  • Terraform Plan 📖success
Show Plan

terraform
Acquiring state lock. This may take a few moments...
�[0m�[1mdata.local_file.file_system_prompt: Reading...�[0m�[0m
�[0m�[1mdata.local_file.file_system_prompt: Read complete after 0s [id=1b64caca607e392bc85ff27243e6022401cc3184]�[0m
�[0m�[1mmodule.azure_open_ai.data.azurerm_client_config.current: Reading...�[0m�[0m
�[0m�[1mmodule.key_vault_ingestion.data.azurerm_client_config.current: Reading...�[0m�[0m
�[0m�[1mmodule.storage_account.data.azurerm_client_config.current: Reading...�[0m�[0m
�[0m�[1mdata.azurerm_network_security_group.network_security_group: Reading...�[0m�[0m
�[0m�[1mazurerm_resource_group.resource_group_ingestion: Refreshing state... [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/bfr-dev-bot-ngst-rg]�[0m
�[0m�[1mazurerm_resource_group.resource_group_consumption: Refreshing state... [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/bfr-dev-bot-cnsm-rg]�[0m
�[0m�[1mmodule.key_vault_consumption.data.azurerm_client_config.current: Reading...�[0m�[0m
�[0m�[1mmodule.key_vault_ingestion.data.azurerm_client_config.current: Read complete after 0s [id=Y2xpZW50Q29uZmlncy9jbGllbnRJZD1lNWRmNjg0My1lYmRlLTRkNzktOWM3ZS03NDMxYTNjZDQzZDI7b2JqZWN0SWQ9OTczZGYyYWQtNGU1ZS00ZThiLTlkZjYtMTdmNjFlOWVmZDU1O3N1YnNjcmlwdGlvbklkPTFmZGFiMTE4LTE2MzgtNDE5YS04YjEyLTA2Yzk1NDM3MTRhMDt0ZW5hbnRJZD0zNzk2M2RkNC1mNGU2LTQwZjgtYTdkNi0yNGI5NzkxOWU0NTI=]�[0m
�[0m�[1mdata.azurerm_route_table.route_table: Reading...�[0m�[0m
�[0m�[1mdata.azurerm_client_config.current: Reading...�[0m�[0m
�[0m�[1mmodule.azure_open_ai.data.azurerm_client_config.current: Read complete after 0s [id=Y2xpZW50Q29uZmlncy9jbGllbnRJZD1lNWRmNjg0My1lYmRlLTRkNzktOWM3ZS03NDMxYTNjZDQzZDI7b2JqZWN0SWQ9OTczZGYyYWQtNGU1ZS00ZThiLTlkZjYtMTdmNjFlOWVmZDU1O3N1YnNjcmlwdGlvbklkPTFmZGFiMTE4LTE2MzgtNDE5YS04YjEyLTA2Yzk1NDM3MTRhMDt0ZW5hbnRJZD0zNzk2M2RkNC1mNGU2LTQwZjgtYTdkNi0yNGI5NzkxOWU0NTI=]�[0m
�[0m�[1mmodule.storage_account.data.azurerm_client_config.current: Read complete after 0s [id=Y2xpZW50Q29uZmlncy9jbGllbnRJZD1lNWRmNjg0My1lYmRlLTRkNzktOWM3ZS03NDMxYTNjZDQzZDI7b2JqZWN0SWQ9OTczZGYyYWQtNGU1ZS00ZThiLTlkZjYtMTdmNjFlOWVmZDU1O3N1YnNjcmlwdGlvbklkPTFmZGFiMTE4LTE2MzgtNDE5YS04YjEyLTA2Yzk1NDM3MTRhMDt0ZW5hbnRJZD0zNzk2M2RkNC1mNGU2LTQwZjgtYTdkNi0yNGI5NzkxOWU0NTI=]�[0m
�[0m�[1mdata.azurerm_virtual_network.virtual_network: Reading...�[0m�[0m
�[0m�[1mmodule.data_factory.data.azurerm_subscription.current: Reading...�[0m�[0m
�[0m�[1mdata.azurerm_client_config.current: Read complete after 0s [id=Y2xpZW50Q29uZmlncy9jbGllbnRJZD1lNWRmNjg0My1lYmRlLTRkNzktOWM3ZS03NDMxYTNjZDQzZDI7b2JqZWN0SWQ9OTczZGYyYWQtNGU1ZS00ZThiLTlkZjYtMTdmNjFlOWVmZDU1O3N1YnNjcmlwdGlvbklkPTFmZGFiMTE4LTE2MzgtNDE5YS04YjEyLTA2Yzk1NDM3MTRhMDt0ZW5hbnRJZD0zNzk2M2RkNC1mNGU2LTQwZjgtYTdkNi0yNGI5NzkxOWU0NTI=]�[0m
�[0m�[1mmodule.key_vault_consumption.data.azurerm_client_config.current: Read complete after 0s [id=Y2xpZW50Q29uZmlncy9jbGllbnRJZD1lNWRmNjg0My1lYmRlLTRkNzktOWM3ZS03NDMxYTNjZDQzZDI7b2JqZWN0SWQ9OTczZGYyYWQtNGU1ZS00ZThiLTlkZjYtMTdmNjFlOWVmZDU1O3N1YnNjcmlwdGlvbklkPTFmZGFiMTE4LTE2MzgtNDE5YS04YjEyLTA2Yzk1NDM3MTRhMDt0ZW5hbnRJZD0zNzk2M2RkNC1mNGU2LTQwZjgtYTdkNi0yNGI5NzkxOWU0NTI=]�[0m
�[0m�[1mdata.azurerm_route_table.route_table: Read complete after 0s [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/ptt-dev-networking-rg/providers/Microsoft.Network/routeTables/ptt-dev-default-rt001]�[0m
�[0m�[1mdata.azurerm_network_security_group.network_security_group: Read complete after 0s [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/ptt-dev-networking-rg/providers/Microsoft.Network/networkSecurityGroups/ptt-dev-default-nsg001]�[0m
�[0m�[1mmodule.data_factory.data.azurerm_subscription.current: Read complete after 0s [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0]�[0m
�[0m�[1mdata.azurerm_virtual_network.virtual_network: Read complete after 0s [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/ptt-dev-networking-rg/providers/Microsoft.Network/virtualNetworks/spoke-ptt-dev-vnet001]�[0m
�[0m�[1mazapi_resource.subnet_web_app: Refreshing state... [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/ptt-dev-networking-rg/providers/Microsoft.Network/virtualNetworks/spoke-ptt-dev-vnet001/subnets/WebAppSubnetBot]�[0m
�[0m�[1mmodule.user_assigned_identity.azurerm_user_assigned_identity.user_assigned_identity: Refreshing state... [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/bfr-dev-bot-cnsm-rg/providers/Microsoft.ManagedIdentity/userAssignedIdentities/bfr-dev-uai001]�[0m
�[0m�[1mmodule.app_service_plan.azurerm_service_plan.service_plan: Refreshing state... [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/bfr-dev-bot-cnsm-rg/providers/Microsoft.Web/serverFarms/bfr-dev-asp001]�[0m
�[0m�[1mmodule.application_insights.azurerm_application_insights.application_insights: Refreshing state... [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/bfr-dev-bot-cnsm-rg/providers/Microsoft.Insights/components/bfr-dev-appi001]�[0m
�[0m�[1mmodule.data_factory.azurerm_data_factory.data_factory: Refreshing state... [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/bfr-dev-bot-ngst-rg/providers/Microsoft.DataFactory/factories/bfr-dev-adf001]�[0m
�[0m�[1mmodule.storage_account.azurerm_storage_account.storage_account: Refreshing state... [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/bfr-dev-bot-ngst-rg/providers/Microsoft.Storage/storageAccounts/bfrdevstg001]�[0m
�[0m�[1mmodule.azure_open_ai.azurerm_cognitive_account.cognitive_account: Refreshing state... [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/bfr-dev-bot-cnsm-rg/providers/Microsoft.CognitiveServices/accounts/bfr-dev-aoai001]�[0m
�[0m�[1mmodule.cosmosdb_account.azurerm_cosmosdb_account.cosmosdb_account: Refreshing state... [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/bfr-dev-bot-cnsm-rg/providers/Microsoft.DocumentDB/databaseAccounts/bfr-dev-cosmos001]�[0m
�[0m�[1mmodule.app_service_plan.data.azurerm_monitor_diagnostic_categories.diagnostic_categories_service_plan: Reading...�[0m�[0m
�[0m�[1mdata.azurerm_log_analytics_workspace.log_analytics_workspace: Reading...�[0m�[0m
�[0m�[1mmodule.data_factory.data.azurerm_monitor_diagnostic_categories.diagnostic_categories_data_factory: Reading...�[0m�[0m
�[0m�[1mmodule.app_service_plan.data.azurerm_monitor_diagnostic_categories.diagnostic_categories_service_plan: Read complete after 0s [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/bfr-dev-bot-cnsm-rg/providers/Microsoft.Web/serverFarms/bfr-dev-asp001]�[0m
�[0m�[1mmodule.app_service_plan.azurerm_monitor_diagnostic_setting.diagnostic_setting_service_plan["0"]: Refreshing state... [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/bfr-dev-bot-cnsm-rg/providers/Microsoft.Web/serverFarms/bfr-dev-asp001|applicationLogs-0]�[0m
�[0m�[1mmodule.data_factory.data.azurerm_monitor_diagnostic_categories.diagnostic_categories_data_factory: Read complete after 0s [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/bfr-dev-bot-ngst-rg/providers/Microsoft.DataFactory/factories/bfr-dev-adf001]�[0m
�[0m�[1mmodule.data_factory.azurerm_monitor_diagnostic_setting.diagnostic_setting_data_factory["0"]: Refreshing state... [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/bfr-dev-bot-ngst-rg/providers/Microsoft.DataFactory/factories/bfr-dev-adf001|applicationLogs-0]�[0m
�[0m�[1mmodule.azure_open_ai.data.azurerm_monitor_diagnostic_categories.diagnostic_categories_cognitive_account: Reading...�[0m�[0m
�[0m�[1mazurerm_role_assignment.uai_roleassignment_open_ai_contributor: Refreshing state... [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/bfr-dev-bot-cnsm-rg/providers/Microsoft.CognitiveServices/accounts/bfr-dev-aoai001/providers/Microsoft.Authorization/roleAssignments/e7e58016-b6f7-26e8-df5e-395cd83bd3d3]�[0m
�[0m�[1mazurerm_cognitive_deployment.cognitive_deployment_gpt_4o: Refreshing state... [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/bfr-dev-bot-cnsm-rg/providers/Microsoft.CognitiveServices/accounts/bfr-dev-aoai001/deployments/gpt-4o]�[0m
�[0m�[1mazapi_resource.subnet_private_endpoints: Refreshing state... [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/ptt-dev-networking-rg/providers/Microsoft.Network/virtualNetworks/spoke-ptt-dev-vnet001/subnets/PrivateEndpointSubnetBot]�[0m
�[0m�[1mdata.azurerm_log_analytics_workspace.log_analytics_workspace: Read complete after 1s [id=/subscriptions/e82c5267-9dc4-4f45-ac13-abdd5e130d27/resourceGroups/ptt-dev-logging-rg/providers/Microsoft.OperationalInsights/workspaces/ptt-dev-log001]�[0m
�[0m�[1mmodule.application_insights.data.azurerm_monitor_diagnostic_categories.diagnostic_categories_application_insights: Reading...�[0m�[0m
�[0m�[1mmodule.bot_service.data.azurerm_application_insights.application_insights: Reading...�[0m�[0m
�[0m�[1mmodule.data_factory.azurerm_private_endpoint.data_factory_private_endpoint_data_factory: Refreshing state... [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/bfr-dev-bot-ngst-rg/providers/Microsoft.Network/privateEndpoints/bfr-dev-adf001-datafactory-pe]�[0m
�[0m�[1mmodule.azure_open_ai.azurerm_private_endpoint.private_endpoint_cognitive_account: Refreshing state... [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/bfr-dev-bot-cnsm-rg/providers/Microsoft.Network/privateEndpoints/bfr-dev-aoai001-account-pe]�[0m
�[0m�[1mmodule.key_vault_ingestion.time_sleep.sleep_connectivity: Refreshing state... [id=2024-10-31T18:34:33Z]�[0m
�[0m�[1mmodule.azure_open_ai.data.azurerm_monitor_diagnostic_categories.diagnostic_categories_cognitive_account: Read complete after 0s [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/bfr-dev-bot-cnsm-rg/providers/Microsoft.CognitiveServices/accounts/bfr-dev-aoai001]�[0m
�[0m�[1mmodule.azure_open_ai.azurerm_monitor_diagnostic_setting.diagnostic_setting_cognitive_account["0"]: Refreshing state... [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/bfr-dev-bot-cnsm-rg/providers/Microsoft.CognitiveServices/accounts/bfr-dev-aoai001|applicationLogs-0]�[0m
�[0m�[1mmodule.application_insights.data.azurerm_monitor_diagnostic_categories.diagnostic_categories_application_insights: Read complete after 0s [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/bfr-dev-bot-cnsm-rg/providers/Microsoft.Insights/components/bfr-dev-appi001]�[0m
�[0m�[1mmodule.application_insights.azurerm_monitor_diagnostic_setting.diagnostic_setting_application_insights["0"]: Refreshing state... [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/bfr-dev-bot-cnsm-rg/providers/Microsoft.Insights/components/bfr-dev-appi001|applicationLogs-0]�[0m
�[0m�[1mmodule.bot_service.data.azurerm_application_insights.application_insights: Read complete after 1s [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/bfr-dev-bot-cnsm-rg/providers/Microsoft.Insights/components/bfr-dev-appi001]�[0m
�[0m�[1mazurerm_cosmosdb_sql_database.cosmosdb_sql_database: Refreshing state... [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/bfr-dev-bot-cnsm-rg/providers/Microsoft.DocumentDB/databaseAccounts/bfr-dev-cosmos001/sqlDatabases/BotDb]�[0m
�[0m�[1mmodule.cosmosdb_account.data.azurerm_monitor_diagnostic_categories.diagnostic_categories_cosmosdb_account: Reading...�[0m�[0m
�[0m�[1mmodule.cosmosdb_account.azurerm_private_endpoint.private_endpoint_cosmosdb_account["Sql"]: Refreshing state... [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/bfr-dev-bot-cnsm-rg/providers/Microsoft.Network/privateEndpoints/bfr-dev-cosmos001-Sql-pe]�[0m
�[0m�[1mmodule.cosmosdb_account.data.azurerm_monitor_diagnostic_categories.diagnostic_categories_cosmosdb_account: Read complete after 0s [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/bfr-dev-bot-cnsm-rg/providers/Microsoft.DocumentDB/databaseAccounts/bfr-dev-cosmos001]�[0m
�[0m�[1mazurerm_linux_web_app.linux_web_app: Refreshing state... [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/bfr-dev-bot-cnsm-rg/providers/Microsoft.Web/sites/bfr-dev-app001]�[0m
�[0m�[1mmodule.azure_open_ai.time_sleep.sleep_connectivity: Refreshing state... [id=2024-10-31T17:18:30Z]�[0m
�[0m�[1mmodule.storage_account.data.azurerm_monitor_diagnostic_categories.diagnostic_categories_storage_account: Reading...�[0m�[0m
�[0m�[1mmodule.storage_account.azurerm_role_assignment.current_roleassignment_storage_blob_data_owner: Refreshing state... [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/bfr-dev-bot-ngst-rg/providers/Microsoft.Storage/storageAccounts/bfrdevstg001/providers/Microsoft.Authorization/roleAssignments/1215bdd9-4b88-a75d-6e49-8ce3b5f7b8c4]�[0m
�[0m�[1mmodule.storage_account.azurerm_private_endpoint.private_endpoint_storage_account["blob"]: Refreshing state... [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/bfr-dev-bot-ngst-rg/providers/Microsoft.Network/privateEndpoints/bfrdevstg001-blob-pe]�[0m
�[0m�[1mmodule.data_factory.azurerm_data_factory_managed_private_endpoint.data_factory_managed_private_endpoints["storage-blob"]: Refreshing state... [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/bfr-dev-bot-ngst-rg/providers/Microsoft.DataFactory/factories/bfr-dev-adf001/managedVirtualNetworks/default/managedPrivateEndpoints/storage-blob]�[0m
�[0m�[1mmodule.data_factory.time_sleep.sleep_connectivity: Refreshing state... [id=2024-10-31T17:20:12Z]�[0m
�[0m�[1mmodule.cosmosdb_account.time_sleep.sleep_connectivity: Refreshing state... [id=2024-10-31T17:29:41Z]�[0m
�[0m�[1mmodule.storage_account.data.azurerm_monitor_diagnostic_categories.diagnostic_categories_storage_account: Read complete after 1s [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/bfr-dev-bot-ngst-rg/providers/Microsoft.Storage/storageAccounts/bfrdevstg001]�[0m
�[0m�[1mmodule.storage_account.azurerm_monitor_diagnostic_setting.diagnostic_setting_storage_account["0"]: Refreshing state... [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/bfr-dev-bot-ngst-rg/providers/Microsoft.Storage/storageAccounts/bfrdevstg001|applicationLogs-0]�[0m
�[0m�[1mmodule.storage_account.time_sleep.sleep_connectivity: Refreshing state... [id=2024-10-31T17:21:04Z]�[0m
�[0m�[1mmodule.storage_account.azurerm_storage_container.storage_container["raw"]: Refreshing state... [id=https://bfrdevstg001.blob.core.windows.net/raw]�[0m
�[0m�[1mmodule.storage_account.azurerm_storage_container.storage_container["curated"]: Refreshing state... [id=https://bfrdevstg001.blob.core.windows.net/curated]�[0m
�[0m�[1mazurerm_private_endpoint.linux_web_app_private_endpoint: Refreshing state... [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/bfr-dev-bot-cnsm-rg/providers/Microsoft.Network/privateEndpoints/bfr-dev-app001-pe]�[0m
�[0m�[1mmodule.bot_service.azurerm_bot_service_azure_bot.bot_service_azure_bot: Refreshing state... [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/bfr-dev-bot-cnsm-rg/providers/Microsoft.BotService/botServices/bfr-dev-bot001]�[0m
�[0m�[1mazurerm_monitor_diagnostic_setting.diagnostic_setting_linux_web_app: Refreshing state... [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/bfr-dev-bot-cnsm-rg/providers/Microsoft.Web/sites/bfr-dev-app001|logAnalytics]�[0m
�[0m�[1mmodule.bot_service.azurerm_private_endpoint.bot_service_azure_bot_private_endpoint_bot: Refreshing state... [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/bfr-dev-bot-cnsm-rg/providers/Microsoft.Network/privateEndpoints/bfr-dev-bot001-bot-pe]�[0m
�[0m�[1mmodule.bot_service.data.azurerm_monitor_diagnostic_categories.diagnostic_categories_bot_service_azure_bot: Reading...�[0m�[0m
�[0m�[1mazurerm_bot_connection.bot_connection_aadv2_oauth: Refreshing state... [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/bfr-dev-bot-cnsm-rg/providers/Microsoft.BotService/botServices/bfr-dev-bot001/connections/aadv2-oauth]�[0m
�[0m�[1mmodule.bot_service.azurerm_private_endpoint.bot_service_azure_bot_private_endpoint_token: Refreshing state... [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/bfr-dev-bot-cnsm-rg/providers/Microsoft.Network/privateEndpoints/bfr-dev-bot001-token-pe]�[0m
�[0m�[1mmodule.bot_service.data.azurerm_monitor_diagnostic_categories.diagnostic_categories_bot_service_azure_bot: Read complete after 1s [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/bfr-dev-bot-cnsm-rg/providers/Microsoft.BotService/botServices/bfr-dev-bot001]�[0m
�[0m�[1mmodule.bot_service.azurerm_monitor_diagnostic_setting.diagnostic_setting_bot_service_azure_bot["0"]: Refreshing state... [id=/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/bfr-dev-bot-cnsm-rg/providers/Microsoft.BotService/botServices/bfr-dev-bot001|applicationLogs-0]�[0m
�[0m�[1mmodule.bot_service.time_sleep.sleep_connectivity: Refreshing state... [id=2024-10-31T17:24:36Z]�[0m

Terraform used the selected providers to generate the following execution
plan. Resource actions are indicated with the following symbols:
  �[32m+�[0m create�[0m
  �[33m~�[0m update in-place�[0m
 �[36m<=�[0m read (data resources)�[0m

Terraform will perform the following actions:

�[1m  # data.azurerm_monitor_diagnostic_categories.diagnostic_categories_linux_web_app�[0m will be read during apply
  # (depends on a resource or a module with changes pending)
�[0m �[36m<=�[0m�[0m data "azurerm_monitor_diagnostic_categories" "diagnostic_categories_linux_web_app" {
      �[32m+�[0m�[0m id                  = (known after apply)
      �[32m+�[0m�[0m log_category_groups = (known after apply)
      �[32m+�[0m�[0m log_category_types  = (known after apply)
      �[32m+�[0m�[0m metrics             = (known after apply)
      �[32m+�[0m�[0m resource_id         = "/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/bfr-dev-bot-cnsm-rg/providers/Microsoft.Web/sites/bfr-dev-app001"
    }

�[1m  # azurerm_linux_web_app.linux_web_app�[0m will be updated in-place
�[0m  �[33m~�[0m�[0m resource "azurerm_linux_web_app" "linux_web_app" {
      �[33m~�[0m�[0m app_settings                                   = {
          �[33m~�[0m�[0m "AZURE_OPENAI_SYSTEM_PROMPT"                 = <<-EOT
                You are a world-class assistant who tells jokes. For anything but jokes, respond politely that you are just trying to make everyone’s life a happier place.
            EOT
            �[90m# (18 unchanged elements hidden)�[0m�[0m
        }
        id                                             = "/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/bfr-dev-bot-cnsm-rg/providers/Microsoft.Web/sites/bfr-dev-app001"
        name                                           = "bfr-dev-app001"
        tags                                           = {
            "workload" = "bot-assistant"
        }
        �[90m# (24 unchanged attributes hidden)�[0m�[0m

        �[90m# (2 unchanged blocks hidden)�[0m�[0m
    }

�[1m  # azurerm_monitor_diagnostic_setting.diagnostic_setting_linux_web_app�[0m will be updated in-place
�[0m  �[33m~�[0m�[0m resource "azurerm_monitor_diagnostic_setting" "diagnostic_setting_linux_web_app" {
        id                             = "/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/bfr-dev-bot-cnsm-rg/providers/Microsoft.Web/sites/bfr-dev-app001|logAnalytics"
        name                           = "logAnalytics"
        �[90m# (5 unchanged attributes hidden)�[0m�[0m

      �[33m~�[0m�[0m enabled_log (known after apply)
      �[31m-�[0m�[0m enabled_log {
          �[31m-�[0m�[0m category_group = "allLogs" �[90m-> null�[0m�[0m
            �[90m# (1 unchanged attribute hidden)�[0m�[0m

          �[31m-�[0m�[0m retention_policy {
              �[31m-�[0m�[0m days    = 0 �[90m-> null�[0m�[0m
              �[31m-�[0m�[0m enabled = false �[90m-> null�[0m�[0m
            }
        }
      �[31m-�[0m�[0m enabled_log {
          �[31m-�[0m�[0m category_group = "audit" �[90m-> null�[0m�[0m
            �[90m# (1 unchanged attribute hidden)�[0m�[0m

          �[31m-�[0m�[0m retention_policy {
              �[31m-�[0m�[0m days    = 0 �[90m-> null�[0m�[0m
              �[31m-�[0m�[0m enabled = false �[90m-> null�[0m�[0m
            }
        }

      �[33m~�[0m�[0m metric (known after apply)
      �[31m-�[0m�[0m metric {
          �[31m-�[0m�[0m category = "AllMetrics" �[90m-> null�[0m�[0m
          �[31m-�[0m�[0m enabled  = true �[90m-> null�[0m�[0m

          �[31m-�[0m�[0m retention_policy {
              �[31m-�[0m�[0m days    = 0 �[90m-> null�[0m�[0m
              �[31m-�[0m�[0m enabled = false �[90m-> null�[0m�[0m
            }
        }
    }

�[1m  # azurerm_role_assignment.data_factory_roleassignment_key_vault_secrets_user�[0m will be created
�[0m  �[32m+�[0m�[0m resource "azurerm_role_assignment" "data_factory_roleassignment_key_vault_secrets_user" {
      �[32m+�[0m�[0m description                      = "Required for accessing secrets in the key vault from the data factory."
      �[32m+�[0m�[0m id                               = (known after apply)
      �[32m+�[0m�[0m name                             = (known after apply)
      �[32m+�[0m�[0m principal_id                     = "c464b453-4a51-4fd1-929e-6c8e17dc8da7"
      �[32m+�[0m�[0m principal_type                   = "ServicePrincipal"
      �[32m+�[0m�[0m role_definition_id               = (known after apply)
      �[32m+�[0m�[0m role_definition_name             = "Key Vault Secrets User"
      �[32m+�[0m�[0m scope                            = (known after apply)
      �[32m+�[0m�[0m skip_service_principal_aad_check = (known after apply)
    }

�[1m  # azurerm_role_assignment.data_factory_roleassignment_storage_blob_data_owner�[0m will be created
�[0m  �[32m+�[0m�[0m resource "azurerm_role_assignment" "data_factory_roleassignment_storage_blob_data_owner" {
      �[32m+�[0m�[0m description                      = "Required for reding and writing data from data factory."
      �[32m+�[0m�[0m id                               = (known after apply)
      �[32m+�[0m�[0m name                             = (known after apply)
      �[32m+�[0m�[0m principal_id                     = "c464b453-4a51-4fd1-929e-6c8e17dc8da7"
      �[32m+�[0m�[0m principal_type                   = "ServicePrincipal"
      �[32m+�[0m�[0m role_definition_id               = (known after apply)
      �[32m+�[0m�[0m role_definition_name             = "Storage Blob Data Owner"
      �[32m+�[0m�[0m scope                            = "/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/bfr-dev-bot-ngst-rg/providers/Microsoft.Storage/storageAccounts/bfrdevstg001"
      �[32m+�[0m�[0m skip_service_principal_aad_check = (known after apply)
    }

�[1m  # azurerm_role_assignment.uai_roleassignment_key_vault_secrets_user�[0m will be created
�[0m  �[32m+�[0m�[0m resource "azurerm_role_assignment" "uai_roleassignment_key_vault_secrets_user" {
      �[32m+�[0m�[0m description                      = "Required for accessing secrets in the key vault from teh web app app settings."
      �[32m+�[0m�[0m id                               = (known after apply)
      �[32m+�[0m�[0m name                             = (known after apply)
      �[32m+�[0m�[0m principal_id                     = "3df57092-2e4d-45a8-9a9f-6d37abccdb39"
      �[32m+�[0m�[0m principal_type                   = "ServicePrincipal"
      �[32m+�[0m�[0m role_definition_id               = (known after apply)
      �[32m+�[0m�[0m role_definition_name             = "Key Vault Secrets User"
      �[32m+�[0m�[0m scope                            = (known after apply)
      �[32m+�[0m�[0m skip_service_principal_aad_check = (known after apply)
    }

�[1m  # module.data_factory.azurerm_data_factory_managed_private_endpoint.data_factory_managed_private_endpoints["keyvault-vault"]�[0m will be created
�[0m  �[32m+�[0m�[0m resource "azurerm_data_factory_managed_private_endpoint" "data_factory_managed_private_endpoints" {
      �[32m+�[0m�[0m data_factory_id    = "/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/bfr-dev-bot-ngst-rg/providers/Microsoft.DataFactory/factories/bfr-dev-adf001"
      �[32m+�[0m�[0m fqdns              = (known after apply)
      �[32m+�[0m�[0m id                 = (known after apply)
      �[32m+�[0m�[0m name               = "keyvault-vault"
      �[32m+�[0m�[0m subresource_name   = "vault"
      �[32m+�[0m�[0m target_resource_id = (known after apply)
    }

�[1m  # module.data_factory.null_resource.data_factory_managed_private_endpoint_storage_blob_approval["keyvault-vault"]�[0m will be created
�[0m  �[32m+�[0m�[0m resource "null_resource" "data_factory_managed_private_endpoint_storage_blob_approval" {
      �[32m+�[0m�[0m id       = (known after apply)
      �[32m+�[0m�[0m triggers = {
          �[32m+�[0m�[0m "run_once" = "true"
        }
    }

�[1m  # module.data_factory.null_resource.data_factory_managed_private_endpoint_storage_blob_approval["storage-blob"]�[0m will be created
�[0m  �[32m+�[0m�[0m resource "null_resource" "data_factory_managed_private_endpoint_storage_blob_approval" {
      �[32m+�[0m�[0m id       = (known after apply)
      �[32m+�[0m�[0m triggers = {
          �[32m+�[0m�[0m "run_once" = "true"
        }
    }

�[1m  # module.key_vault_consumption.data.azurerm_monitor_diagnostic_categories.diagnostic_categories_key_vault�[0m will be read during apply
  # (config refers to values not yet known)
�[0m �[36m<=�[0m�[0m data "azurerm_monitor_diagnostic_categories" "diagnostic_categories_key_vault" {
      �[32m+�[0m�[0m id                  = (known after apply)
      �[32m+�[0m�[0m log_category_groups = (known after apply)
      �[32m+�[0m�[0m log_category_types  = (known after apply)
      �[32m+�[0m�[0m metrics             = (known after apply)
      �[32m+�[0m�[0m resource_id         = (known after apply)
    }

�[1m  # module.key_vault_consumption.azurerm_key_vault.key_vault�[0m will be created
�[0m  �[32m+�[0m�[0m resource "azurerm_key_vault" "key_vault" {
      �[32m+�[0m�[0m access_policy                   = []
      �[32m+�[0m�[0m enable_rbac_authorization       = true
      �[32m+�[0m�[0m enabled_for_deployment          = false
      �[32m+�[0m�[0m enabled_for_disk_encryption     = false
      �[32m+�[0m�[0m enabled_for_template_deployment = false
      �[32m+�[0m�[0m id                              = (known after apply)
      �[32m+�[0m�[0m location                        = "northeurope"
      �[32m+�[0m�[0m name                            = "bfr-dev-kv001"
      �[32m+�[0m�[0m public_network_access_enabled   = false
      �[32m+�[0m�[0m purge_protection_enabled        = true
      �[32m+�[0m�[0m resource_group_name             = "bfr-dev-bot-cnsm-rg"
      �[32m+�[0m�[0m sku_name                        = "standard"
      �[32m+�[0m�[0m soft_delete_retention_days      = 7
      �[32m+�[0m�[0m tags                            = {
          �[32m+�[0m�[0m "workload" = "bot-assistant"
        }
      �[32m+�[0m�[0m tenant_id                       = "37963dd4-f4e6-40f8-a7d6-24b97919e452"
      �[32m+�[0m�[0m vault_uri                       = (known after apply)

      �[32m+�[0m�[0m contact (known after apply)

      �[32m+�[0m�[0m network_acls {
          �[32m+�[0m�[0m bypass         = "AzureServices"
          �[32m+�[0m�[0m default_action = "Deny"
        }
    }

�[1m  # module.key_vault_consumption.azurerm_monitor_diagnostic_setting.diagnostic_setting_key_vault["0"]�[0m will be created
�[0m  �[32m+�[0m�[0m resource "azurerm_monitor_diagnostic_setting" "diagnostic_setting_key_vault" {
      �[32m+�[0m�[0m id                             = (known after apply)
      �[32m+�[0m�[0m log_analytics_destination_type = (known after apply)
      �[32m+�[0m�[0m log_analytics_workspace_id     = "/subscriptions/e82c5267-9dc4-4f45-ac13-abdd5e130d27/resourceGroups/ptt-dev-logging-rg/providers/Microsoft.OperationalInsights/workspaces/ptt-dev-log001"
      �[32m+�[0m�[0m name                           = "applicationLogs-0"
      �[32m+�[0m�[0m target_resource_id             = (known after apply)

      �[32m+�[0m�[0m enabled_log (known after apply)

      �[32m+�[0m�[0m metric (known after apply)
    }

�[1m  # module.key_vault_consumption.azurerm_private_endpoint.private_endpoint_cognitive_account_vault�[0m will be created
�[0m  �[32m+�[0m�[0m resource "azurerm_private_endpoint" "private_endpoint_cognitive_account_vault" {
      �[32m+�[0m�[0m custom_dns_configs            = (known after apply)
      �[32m+�[0m�[0m custom_network_interface_name = "bfr-dev-kv001-vault-nic"
      �[32m+�[0m�[0m id                            = (known after apply)
      �[32m+�[0m�[0m location                      = "northeurope"
      �[32m+�[0m�[0m name                          = "bfr-dev-kv001-vault-pe"
      �[32m+�[0m�[0m network_interface             = (known after apply)
      �[32m+�[0m�[0m private_dns_zone_configs      = (known after apply)
      �[32m+�[0m�[0m resource_group_name           = "bfr-dev-bot-cnsm-rg"
      �[32m+�[0m�[0m subnet_id                     = "/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/ptt-dev-networking-rg/providers/Microsoft.Network/virtualNetworks/spoke-ptt-dev-vnet001/subnets/PrivateEndpointSubnetBot"
      �[32m+�[0m�[0m tags                          = {
          �[32m+�[0m�[0m "workload" = "bot-assistant"
        }

      �[32m+�[0m�[0m private_dns_zone_group {
          �[32m+�[0m�[0m id                   = (known after apply)
          �[32m+�[0m�[0m name                 = "bfr-dev-kv001-arecord"
          �[32m+�[0m�[0m private_dns_zone_ids = [
              �[32m+�[0m�[0m "/subscriptions/e82c5267-9dc4-4f45-ac13-abdd5e130d27/resourceGroups/ptt-dev-privatedns-rg/providers/Microsoft.Network/privateDnsZones/privatelink.vaultcore.azure.net",
            ]
        }

      �[32m+�[0m�[0m private_service_connection {
          �[32m+�[0m�[0m is_manual_connection           = false
          �[32m+�[0m�[0m name                           = "bfr-dev-kv001-vault-svc"
          �[32m+�[0m�[0m private_connection_resource_id = (known after apply)
          �[32m+�[0m�[0m private_ip_address             = (known after apply)
          �[32m+�[0m�[0m subresource_names              = [
              �[32m+�[0m�[0m "vault",
            ]
        }
    }

�[1m  # module.key_vault_consumption.azurerm_role_assignment.current_roleassignment_key_vault�[0m will be created
�[0m  �[32m+�[0m�[0m resource "azurerm_role_assignment" "current_roleassignment_key_vault" {
      �[32m+�[0m�[0m id                               = (known after apply)
      �[32m+�[0m�[0m name                             = (known after apply)
      �[32m+�[0m�[0m principal_id                     = "973df2ad-4e5e-4e8b-9df6-17f61e9efd55"
      �[32m+�[0m�[0m principal_type                   = (known after apply)
      �[32m+�[0m�[0m role_definition_id               = (known after apply)
      �[32m+�[0m�[0m role_definition_name             = "Key Vault Administrator"
      �[32m+�[0m�[0m scope                            = (known after apply)
      �[32m+�[0m�[0m skip_service_principal_aad_check = (known after apply)
    }

�[1m  # module.key_vault_consumption.time_sleep.sleep_connectivity�[0m will be created
�[0m  �[32m+�[0m�[0m resource "time_sleep" "sleep_connectivity" {
      �[32m+�[0m�[0m create_duration = "120s"
      �[32m+�[0m�[0m id              = (known after apply)
    }

�[1m  # module.key_vault_ingestion.data.azurerm_monitor_diagnostic_categories.diagnostic_categories_key_vault�[0m will be read during apply
  # (config refers to values not yet known)
�[0m �[36m<=�[0m�[0m data "azurerm_monitor_diagnostic_categories" "diagnostic_categories_key_vault" {
      �[32m+�[0m�[0m id                  = (known after apply)
      �[32m+�[0m�[0m log_category_groups = (known after apply)
      �[32m+�[0m�[0m log_category_types  = (known after apply)
      �[32m+�[0m�[0m metrics             = (known after apply)
      �[32m+�[0m�[0m resource_id         = (known after apply)
    }

�[1m  # module.key_vault_ingestion.azurerm_key_vault.key_vault�[0m will be created
�[0m  �[32m+�[0m�[0m resource "azurerm_key_vault" "key_vault" {
      �[32m+�[0m�[0m access_policy                   = []
      �[32m+�[0m�[0m enable_rbac_authorization       = true
      �[32m+�[0m�[0m enabled_for_deployment          = false
      �[32m+�[0m�[0m enabled_for_disk_encryption     = false
      �[32m+�[0m�[0m enabled_for_template_deployment = false
      �[32m+�[0m�[0m id                              = (known after apply)
      �[32m+�[0m�[0m location                        = "northeurope"
      �[32m+�[0m�[0m name                            = "bfr-dev-ngst-kv001"
      �[32m+�[0m�[0m public_network_access_enabled   = false
      �[32m+�[0m�[0m purge_protection_enabled        = true
      �[32m+�[0m�[0m resource_group_name             = "bfr-dev-bot-ngst-rg"
      �[32m+�[0m�[0m sku_name                        = "standard"
      �[32m+�[0m�[0m soft_delete_retention_days      = 7
      �[32m+�[0m�[0m tags                            = {
          �[32m+�[0m�[0m "workload" = "bot-assistant"
        }
      �[32m+�[0m�[0m tenant_id                       = "37963dd4-f4e6-40f8-a7d6-24b97919e452"
      �[32m+�[0m�[0m vault_uri                       = (known after apply)

      �[32m+�[0m�[0m contact (known after apply)

      �[32m+�[0m�[0m network_acls {
          �[32m+�[0m�[0m bypass         = "AzureServices"
          �[32m+�[0m�[0m default_action = "Deny"
        }
    }

�[1m  # module.key_vault_ingestion.azurerm_monitor_diagnostic_setting.diagnostic_setting_key_vault["0"]�[0m will be created
�[0m  �[32m+�[0m�[0m resource "azurerm_monitor_diagnostic_setting" "diagnostic_setting_key_vault" {
      �[32m+�[0m�[0m id                             = (known after apply)
      �[32m+�[0m�[0m log_analytics_destination_type = (known after apply)
      �[32m+�[0m�[0m log_analytics_workspace_id     = "/subscriptions/e82c5267-9dc4-4f45-ac13-abdd5e130d27/resourceGroups/ptt-dev-logging-rg/providers/Microsoft.OperationalInsights/workspaces/ptt-dev-log001"
      �[32m+�[0m�[0m name                           = "applicationLogs-0"
      �[32m+�[0m�[0m target_resource_id             = (known after apply)

      �[32m+�[0m�[0m enabled_log (known after apply)

      �[32m+�[0m�[0m metric (known after apply)
    }

�[1m  # module.key_vault_ingestion.azurerm_private_endpoint.private_endpoint_cognitive_account_vault�[0m will be created
�[0m  �[32m+�[0m�[0m resource "azurerm_private_endpoint" "private_endpoint_cognitive_account_vault" {
      �[32m+�[0m�[0m custom_dns_configs            = (known after apply)
      �[32m+�[0m�[0m custom_network_interface_name = "bfr-dev-ngst-kv001-vault-nic"
      �[32m+�[0m�[0m id                            = (known after apply)
      �[32m+�[0m�[0m location                      = "northeurope"
      �[32m+�[0m�[0m name                          = "bfr-dev-ngst-kv001-vault-pe"
      �[32m+�[0m�[0m network_interface             = (known after apply)
      �[32m+�[0m�[0m private_dns_zone_configs      = (known after apply)
      �[32m+�[0m�[0m resource_group_name           = "bfr-dev-bot-ngst-rg"
      �[32m+�[0m�[0m subnet_id                     = "/subscriptions/1fdab118-1638-419a-8b12-06c9543714a0/resourceGroups/ptt-dev-networking-rg/providers/Microsoft.Network/virtualNetworks/spoke-ptt-dev-vnet001/subnets/PrivateEndpointSubnetBot"
      �[32m+�[0m�[0m tags                          = {
          �[32m+�[0m�[0m "workload" = "bot-assistant"
        }

      �[32m+�[0m�[0m private_dns_zone_group {
          �[32m+�[0m�[0m id                   = (known after apply)
          �[32m+�[0m�[0m name                 = "bfr-dev-ngst-kv001-arecord"
          �[32m+�[0m�[0m private_dns_zone_ids = [
              �[32m+�[0m�[0m "/subscriptions/e82c5267-9dc4-4f45-ac13-abdd5e130d27/resourceGroups/ptt-dev-privatedns-rg/providers/Microsoft.Network/privateDnsZones/privatelink.vaultcore.azure.net",
            ]
        }

      �[32m+�[0m�[0m private_service_connection {
          �[32m+�[0m�[0m is_manual_connection           = false
          �[32m+�[0m�[0m name                           = "bfr-dev-ngst-kv001-vault-svc"
          �[32m+�[0m�[0m private_connection_resource_id = (known after apply)
          �[32m+�[0m�[0m private_ip_address             = (known after apply)
          �[32m+�[0m�[0m subresource_names              = [
              �[32m+�[0m�[0m "vault",
            ]
        }
    }

�[1m  # module.key_vault_ingestion.azurerm_role_assignment.current_roleassignment_key_vault�[0m will be created
�[0m  �[32m+�[0m�[0m resource "azurerm_role_assignment" "current_roleassignment_key_vault" {
      �[32m+�[0m�[0m id                               = (known after apply)
      �[32m+�[0m�[0m name                             = (known after apply)
      �[32m+�[0m�[0m principal_id                     = "973df2ad-4e5e-4e8b-9df6-17f61e9efd55"
      �[32m+�[0m�[0m principal_type                   = (known after apply)
      �[32m+�[0m�[0m role_definition_id               = (known after apply)
      �[32m+�[0m�[0m role_definition_name             = "Key Vault Administrator"
      �[32m+�[0m�[0m scope                            = (known after apply)
      �[32m+�[0m�[0m skip_service_principal_aad_check = (known after apply)
    }

�[1mPlan:�[0m 15 to add, 2 to change, 0 to destroy.
�[0m�[90m
─────────────────────────────────────────────────────────────────────────────�[0m

Note: You didn't use the -out option to save this plan, so Terraform can't
guarantee to take exactly these actions if you run "terraform apply" now.
Releasing state lock. This may take a few moments...

Copy link
Contributor Author

@marvinbuss marvinbuss left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM!

@marvinbuss marvinbuss marked this pull request as ready for review November 1, 2024 09:14
@marvinbuss marvinbuss merged commit 5f9ea8d into main Nov 1, 2024
8 checks passed
@marvinbuss marvinbuss deleted the marvinbuss/add_adf branch November 1, 2024 09:14
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

enhancement New feature or request

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants