Skip to content

Commit

Permalink
[pre-commit.ci] auto fixes from pre-commit.com hooks
Browse files Browse the repository at this point in the history
for more information, see https://pre-commit.ci
  • Loading branch information
pre-commit-ci[bot] committed Oct 7, 2024
1 parent 239990d commit 7883c28
Show file tree
Hide file tree
Showing 18 changed files with 28 additions and 31 deletions.
2 changes: 1 addition & 1 deletion .deepsource.toml
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
version = 1

[[analyzers]]
name = "terraform"
name = "terraform"
2 changes: 1 addition & 1 deletion .github/workflows/auto_assignee.yml
Original file line number Diff line number Diff line change
Expand Up @@ -11,4 +11,4 @@ jobs:
secrets:
GITHUB: ${{ secrets.GITHUB }}
with:
assignees: 'clouddrove-ci'
assignees: 'clouddrove-ci'
2 changes: 1 addition & 1 deletion .github/workflows/automerge.yml
Original file line number Diff line number Diff line change
Expand Up @@ -8,4 +8,4 @@
secrets:
GITHUB: ${{ secrets.GITHUB }}
with:
tfcheck: 'example-complete / Check code format'
tfcheck: 'example-complete / Check code format'
2 changes: 1 addition & 1 deletion .github/workflows/changelog.yml
Original file line number Diff line number Diff line change
Expand Up @@ -10,4 +10,4 @@ jobs:
uses: clouddrove/github-shared-workflows/.github/workflows/changelog.yml@master
secrets: inherit
with:
branch: 'master'
branch: 'master'
2 changes: 1 addition & 1 deletion .github/workflows/readme.yml
Original file line number Diff line number Diff line change
Expand Up @@ -12,4 +12,4 @@ jobs:
uses: clouddrove/github-shared-workflows/.github/workflows/readme.yml@master
secrets:
TOKEN : ${{ secrets.GITHUB }}
SLACK_WEBHOOK_TERRAFORM: ${{ secrets.SLACK_WEBHOOK_TERRAFORM }}
SLACK_WEBHOOK_TERRAFORM: ${{ secrets.SLACK_WEBHOOK_TERRAFORM }}
2 changes: 1 addition & 1 deletion .github/workflows/tf-check.yml
Original file line number Diff line number Diff line change
Expand Up @@ -12,4 +12,4 @@ jobs:
example-diff_sub:
uses: clouddrove/github-shared-workflows/.github/workflows/tf-checks.yml@master
with:
working_directory: './examples/diff_sub'
working_directory: './examples/diff_sub'
2 changes: 1 addition & 1 deletion .github/workflows/tflint.yml
Original file line number Diff line number Diff line change
Expand Up @@ -8,4 +8,4 @@ jobs:
tf-lint:
uses: clouddrove/github-shared-workflows/.github/workflows/tf-lint.yml@master
secrets:
GITHUB: ${{ secrets.GITHUB }}
GITHUB: ${{ secrets.GITHUB }}
2 changes: 1 addition & 1 deletion .github/workflows/tfsec.yml
Original file line number Diff line number Diff line change
Expand Up @@ -8,4 +8,4 @@ jobs:
uses: clouddrove/github-shared-workflows/.github/workflows/tfsec.yml@master
secrets: inherit
with:
working_directory: '.'
working_directory: '.'
2 changes: 1 addition & 1 deletion .gitignore
Original file line number Diff line number Diff line change
Expand Up @@ -5,4 +5,4 @@
.idea
*.iml
.terraform.tfstate.lock.info
.terraform.lock.hcl
.terraform.lock.hcl
12 changes: 6 additions & 6 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -7,7 +7,7 @@
Terraform AZURE Monitor
</h1>

<p align="center" style="font-size: 1.2rem;">
<p align="center" style="font-size: 1.2rem;">
This terraform module is designed to create Azure Monitor Private Link Scope (AMPLS) resources. Image result for ampls An Azure Monitor private link connects a private endpoint to a set of Azure Monitor resources to define the boundaries of your monitoring network.
</p>

Expand Down Expand Up @@ -38,7 +38,7 @@
<hr>


We eat, drink, sleep and most importantly love **DevOps**. We are working towards strategies for standardizing architecture while ensuring security for the infrastructure. We are strong believer of the philosophy <b>Bigger problems are always solved by breaking them into smaller manageable problems</b>. Resonating with microservices architecture, it is considered best-practice to run database, cluster, storage in smaller <b>connected yet manageable pieces</b> within the infrastructure.
We eat, drink, sleep and most importantly love **DevOps**. We are working towards strategies for standardizing architecture while ensuring security for the infrastructure. We are strong believer of the philosophy <b>Bigger problems are always solved by breaking them into smaller manageable problems</b>. Resonating with microservices architecture, it is considered best-practice to run database, cluster, storage in smaller <b>connected yet manageable pieces</b> within the infrastructure.

This module is basically combination of [Terraform open source](https://www.terraform.io/) and includes automatation tests and examples. It also helps to create and improve your infrastructure with minimalistic code instead of maintaining the whole infrastructure code yourself.

Expand All @@ -49,7 +49,7 @@ We have [*fifty plus terraform modules*][terraform_modules]. A few of them are c

## Prerequisites

This module has a few dependencies:
This module has a few dependencies:

- [Terraform 1.x.x](https://learn.hashicorp.com/terraform/getting-started/install.html)
- [Go](https://golang.org/doc/install)
Expand All @@ -70,7 +70,7 @@ This module has a few dependencies:

### Simple Example
Here is an example of how you can use this module in your inventory structure:

```hcl
module "key_vault" {
source = "clouddrove/monitor/azure"
Expand Down Expand Up @@ -131,7 +131,7 @@ No output.


## Testing
In this module testing is performed with [terratest](https://github.com/gruntwork-io/terratest) and it creates a small piece of infrastructure, matches the output like ARN, ID and Tags name etc and destroy infrastructure in your AWS account. This testing is written in GO, so you need a [GO environment](https://golang.org/doc/install) in your system.
In this module testing is performed with [terratest](https://github.com/gruntwork-io/terratest) and it creates a small piece of infrastructure, matches the output like ARN, ID and Tags name etc and destroy infrastructure in your AWS account. This testing is written in GO, so you need a [GO environment](https://golang.org/doc/install) in your system.

You need to run the following command in the testing folder:
```hcl
Expand All @@ -140,7 +140,7 @@ You need to run the following command in the testing folder:



## Feedback
## Feedback
If you come accross a bug or have any feedback, please log it in our [issue tracker](https://github.com/clouddrove/terraform-azure-monitor/issues), or feel free to drop us an email at [hello@clouddrove.com](mailto:hello@clouddrove.com).

If you have found it worth your time, go ahead and give us a ★ on [our GitHub](https://github.com/clouddrove/terraform-azure-monitor)!
Expand Down
4 changes: 2 additions & 2 deletions README.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -37,7 +37,7 @@ include:
# yamllint disable rule:line-length
usage: |-
Here is an example of how you can use this module in your inventory structure:
```hcl
module "key_vault" {
source = "clouddrove/monitor/azure"
Expand All @@ -56,4 +56,4 @@ usage: |-
"privatelink.oms.opinsights.azure.com",
]
}
```
```
13 changes: 5 additions & 8 deletions examples/complete/example.tf
Original file line number Diff line number Diff line change
Expand Up @@ -12,7 +12,7 @@ locals {
environment = "test"
}

##-----------------------------------------------------------------------------
##-----------------------------------------------------------------------------
## Resource Group module call
## Resource group in which all resources will be deployed.
##-----------------------------------------------------------------------------
Expand All @@ -25,7 +25,7 @@ module "resource_group" {
location = "Canada Central"
}

##-----------------------------------------------------------------------------
##-----------------------------------------------------------------------------
## Virtual Network module call.
##-----------------------------------------------------------------------------
module "vnet" {
Expand All @@ -38,7 +38,7 @@ module "vnet" {
address_spaces = ["10.0.0.0/16"]
}

##-----------------------------------------------------------------------------
##-----------------------------------------------------------------------------
## Subnet module call.
## Delegated subnet for mysql.
##-----------------------------------------------------------------------------
Expand All @@ -64,9 +64,9 @@ module "subnet" {
}
}

##-----------------------------------------------------------------------------
##-----------------------------------------------------------------------------
## Log Analytics module call.
## Log analytics workspace in which storage diagnostic logs will be sent.
## Log analytics workspace in which storage diagnostic logs will be sent.
##-----------------------------------------------------------------------------
module "log-analytics" {
source = "clouddrove/log-analytics/azure"
Expand Down Expand Up @@ -105,6 +105,3 @@ module "ampls" {
"privatelink.oms.opinsights.azure.com",
]
}



2 changes: 1 addition & 1 deletion examples/complete/versions.tf
Original file line number Diff line number Diff line change
Expand Up @@ -9,4 +9,4 @@ terraform {
version = ">=3.112.0"
}
}
}
}
2 changes: 1 addition & 1 deletion examples/diff_sub/example.tf
Original file line number Diff line number Diff line change
Expand Up @@ -41,4 +41,4 @@ module "ampls_diff_subs" {
"privatelink.ods.opinsights.azure.com",
"privatelink.oms.opinsights.azure.com",
]
}
}
2 changes: 1 addition & 1 deletion examples/diff_sub/versions.tf
Original file line number Diff line number Diff line change
Expand Up @@ -9,4 +9,4 @@ terraform {
version = ">=3.112.0"
}
}
}
}
2 changes: 1 addition & 1 deletion main.tf
Original file line number Diff line number Diff line change
Expand Up @@ -82,4 +82,4 @@ resource "azurerm_private_endpoint" "diff_sub_pe" {
private_connection_resource_id = var.azurerm_monitor_private_link_scope_id == null ? join("", azurerm_monitor_private_link_scope.main[0].id) : var.azurerm_monitor_private_link_scope_id
subresource_names = ["azuremonitor"]
}
}
}
2 changes: 1 addition & 1 deletion variables.tf
Original file line number Diff line number Diff line change
Expand Up @@ -108,4 +108,4 @@ variable "diff_sub_location" {
type = string
default = ""
description = "Location where different subscription resource should be created."
}
}
2 changes: 1 addition & 1 deletion versions.tf
Original file line number Diff line number Diff line change
Expand Up @@ -10,4 +10,4 @@ terraform {
configuration_aliases = [azurerm.main_sub, azurerm.dns_sub]
}
}
}
}

0 comments on commit 7883c28

Please sign in to comment.