Skip to content

Comments

chore(deps): update otel/opentelemetry-collector-contrib docker tag to v0.146.1#233

Open
renovate[bot] wants to merge 1 commit intomasterfrom
renovate/otel-opentelemetry-collector-contrib-0.x
Open

chore(deps): update otel/opentelemetry-collector-contrib docker tag to v0.146.1#233
renovate[bot] wants to merge 1 commit intomasterfrom
renovate/otel-opentelemetry-collector-contrib-0.x

Conversation

@renovate
Copy link
Contributor

@renovate renovate bot commented Jul 31, 2024

ℹ️ Note

This PR body was truncated due to platform limits.

This PR contains the following updates:

Package Update Change
otel/opentelemetry-collector-contrib minor 0.106.00.146.1

Warning

Some dependencies could not be looked up. Check the Dependency Dashboard for more information.


Release Notes

open-telemetry/opentelemetry-collector-releases (otel/opentelemetry-collector-contrib)

v0.146.1

Compare Source

🛑 Breaking changes 🛑
  • bigipreceiver: Removing unmaintained component (#​46039)

v0.146.0

Compare Source

v0.145.0

Compare Source

v0.144.0

Compare Source

💡 Enhancements 💡
  • opampsupervisor: Readd fixed MSI package release artifacts for the OpAMP supervisor (#​1261, #​1332)

v0.143.1

Compare Source

🧰 Bug fixes 🧰
  • opampsupervisor: revert "Add MSI package release artifacts for the OpAMP supervisor (#​1261)" (#​1332)

v0.143.0

Compare Source

💡 Enhancements 💡
  • opampsupervisor: Add MSI package release artifacts for the OpAMP supervisor (#​1261)

v0.142.0

Compare Source

🚀 New components 🚀
  • contrib: Add yanggrpcreceiver to the contrib distribution (#​1306)
  • otelcol-contrib: Add the macOS Unified Logging receiver (#​44089)
  • otelcol-contrib: Add the systemd receiver (#​1298)
💡 Enhancements 💡
  • otelcol-ebpf-profiler: update ebpf-profiler to v0.0.202549 (#​1295)

v0.141.0

Compare Source

🛑 Breaking changes 🛑
  • exporter/carbon: Remove unmaintained component (#​1279)
🚀 New components 🚀
  • ebpf-profiler: Add the healthcheck and pprof extensions to the ebpf-profiler distribution (#​1274)

v0.140.1

Compare Source

🚀 New components 🚀
  • ebpf-profiler: Add the opampextension to the ebpf-profiler distribution (#​1237)
  • ebpf-profiler: Add the transformprocessor to the ebpf-profiler distribution (#​1251)
  • exporter/googlecloudstorage: Add google cloud storage exporter to contrib distribution. (#​1253)

v0.140.0

Compare Source

Check the v0.140.0 contrib changelog and the v0.140.0 core changelog for changelogs on specific components.

Changelog

v0.139.0

Compare Source

🛑 Breaking changes 🛑
  • ecstaskobserver: Removing unmaintained component (#​1232)
🚀 New components 🚀
  • contrib: Add GitLab receiver to contrib distribution (#​1225)
💡 Enhancements 💡
  • opampsupervisor: Add .deb and .rpm packages release artifacts for the OpAMP supervisor (#​1209)

v0.138.0

Compare Source

🚀 New components 🚀
  • unrollprocessor: Adds the unroll processor to the Contrib distribution (#​1189)
💡 Enhancements 💡
  • packaging: Allow in-place upgrades for Windows MSI installations (#​1197)

v0.137.0

Compare Source

v0.136.0

Compare Source

💡 Enhancements 💡
  • service/telemetry: Stops pinning go.opentelemetry.io/otel/exporters/prometheus to v0.58.0 (#​1178)

v0.135.0

Compare Source

v0.134.1

Compare Source

Check the v0.134.1 contrib changelog and the v0.134.1 core changelog for changelogs on specific components.

Changelog

v0.133.0

Compare Source

🚩 Deprecations 🚩
  • sapmreceiver: Remove the sapmreceiver from contrib as deprecation period has passed. (#​1125)
🚀 New components 🚀
  • cgroupruntime: Add the cgroupruntime extension to the Contrib and K8s distributions (#​789)
  • contrib: This feature introduces anomaly detection using the Online Isolation Forest algorithm applied to streaming - traces, metrics, or logs (#​1124)
💡 Enhancements 💡
  • ebpf-profiler: Start producing release artifacts for the eBPF profiler distribution. (#​984)

v0.132.4

Compare Source

v0.132.4 is a patch release attempting to fix a bug in the release pipelines. Please see v0.132.0 for release notes.

v0.132.3

Compare Source

v0.132.3 is a patch release attempting to fix a bug in the release pipelines. Please see v0.132.0 for release notes.

v0.132.2

Compare Source

Images and binaries for collector distributions here: https://github.com/open-telemetry/opentelemetry-collector-releases/releases/tag/v0.132.2

v0.132.2

v0.132.2 is a patch release attempting to fix a misfire in the build. Please see v0.132.0 for release notes.

v0.132.1

Compare Source

v0.132.1

v0.132.1 is a patch release fixing the script used to build and push Windows docker image. Please see v0.132.0 for release notes.

v0.132.0

Compare Source

🛑 Breaking changes 🛑
  • releases: Fix artifact checksum files being incomplete and split between Linux/Darwin and Windows. (#​1002, #​1086)
    This fixes a bug that occurred because releases for Windows and other Platforms are split.
    The Windows release always overwrote the checksum files already created for Linux and Darwin and so, only
    the Windows checksums were accessible in the end.

    This change is breaking because checksum files for Linux/Darwin and Windows are now split.

  • otelcol: Remove deprecated opencensus exporter and receiver (#​1056)

  • otelcol-contrib: Remove deprecated opencensus exporter and receiver (#​1056)

  • otelcol-k8s: Remove deprecated opencensus exporter and receiver (#​1056)

💡 Enhancements 💡
  • contrib: Add skywalkingencodingextension in otelcol-contrib distribution (#​1078)
  • releases: Introduce nightly releases (#​1016)
  • platforms: Add Tier 3 support for riscv64 (#​968, #​969)
    New Tier 3 platform: riscv64 architecture is now included,
    allowing the collector to be built and distributed for this platform.
🧰 Bug fixes 🧰
  • service/telemetry: Pins go.opentelemetry.io/otel/exporters/prometheus to v0.58.0 (#​1067)
    go.opentelemetry.io/otel/exporters/prometheus v0.59.x has a bug leading to unexpected suffix in metric names, we want to stay with v0.58.0 in the artifacts.

v0.131.1

Compare Source

Check the v0.131.0 contrib changelog and the v0.131.0 core changelog for changelogs on specific components.

Changelog

🧰 Bug fixes 🧰
  • service/telemetry: Pins go.opentelemetry.io/otel/exporters/prometheus to v0.58.0 (#​1067)
    go.opentelemetry.io/otel/exporters/prometheus v0.59.x has a bug leading to unexpected suffix in metric names, we want to stay with v0.58.0 in the artifacts.

v0.131.0

Compare Source

🛑 Breaking changes 🛑
🚀 New components 🚀
  • prometheusremotewritereceiver: Add the prometheusremotewritereceiver component to the contrib collector (#​1020)
  • tinybirdexporter: Add tinybird exporter to contrib distribution (#​1045)
💡 Enhancements 💡
  • contrib: add the text_encoding encoding extension to the contrib distribution (#​1025)
  • all: Removes usages of golang.org/x/net/trace which uses html/template and text/template in gRPC. These usages disable golang DCE. (#​1018)

v0.130.1

Compare Source

Check the v0.130.1 core changelog for changelogs on specific components. There is no opentelemetry-collector-contrib repository v0.130.1 release, only a contrib binary release.

This bugfix release fixes an issue with the internal telemetry Prometheus exporter. See more details here: open-telemetry/opentelemetry-go#7039

Changelog

v0.130.0

Compare Source

🚀 New components 🚀
  • coralogixprocessor: Add Coralogix processor to the OpenTelemetry Collector Contrib. (#​1008)
  • awslogsencodingextension: Add the awslogsencodingextension component to the contrib collector (#​996)
🧰 Bug fixes 🧰
  • release: Revert to old docker token (#​995)

v0.129.1

Compare Source

Check the v0.129.0 contrib changelog and the v0.129.0 core changelog for changelogs on specific components.

Due to difficulties with the release process, the v0.129.1 artifact release corresponds to the v0.129.0 source code releases.

v0.129.1

  • 22c1148 Revert "use DOCKER_TOKEN_COLLECTOR_RELEASES rather than DOCKER_PASSWO… (#​995)

v0.129.0

🚀 New components 🚀

v0.128.0

Compare Source

v0.127.0

Compare Source

🚀 New components 🚀
  • faroreceiver, faroexporter: Add faro receiver and faro exporter to the otelcol-contrib distribution (#​955)
  • googlesecretmanager: Add googlesecretmanagerprovider to the contrib distribution (#​949)
  • metricstarttimeprocessor: Add metricstarttimeprocessor to the contrib distribution (#​940)
  • stefreceiver, stefexporter: Add stefexporter and stefreceiver to otelcol-contrib distribution (#​956)
💡 Enhancements 💡
  • ebpf-profiler: Build releases of the eBPF profiler distribution (#​958)

v0.126.0

Compare Source

🚀 New components 🚀
  • k8sleaderelectorextension: add k8sleaderelector extension to otelcol-contrib and otelcol-k8s distributions (#​943)
🧰 Bug fixes 🧰
  • image repository: Re-enable publishing images to dockerhub (#​938)

v0.123.0

Compare Source

🚀 New components 🚀
  • lokiexporter: Add the component loki exporter to the distribution (#​892)
  • contrib: Add tcpcheckreceiver receiver to the contrib distribution (#​865)
  • contrib: Add saphana receiver (#​876)
  • awscloudwatchmetricstreamsencodingextension: Add the AWS CloudWatch Metric Streams encoding extension to the contrib distribution (#​883)
  • schemaprocessor: Add Schema Processor to contrib
    (#​891)
  • kafkatopicsobserver: Add kafkatopicsobserver extension (#​894)
  • tlscheckreceiver: Adding tcpcheckreceiver to otelcol-contrib (#​880)
💡 Enhancements 💡
  • packaging: Start producing container images for Windows 2019 and 2022 on amd64 (#​339)

v0.122.1

Compare Source

Check the v0.122.1 contrib changelog and the v0.122.1 core changelog for changelogs on specific components.

Changelog

v0.122.0

Compare Source

🛑 Breaking changes 🛑
  • contrib: Remove the component loki exporter from the distribution, as it has reached EOL (#​854)
🚀 New components 🚀
  • opampsupervisor: publish binaries and container images for the OpAMP Supervisor (#​858)
🧰 Bug fixes 🧰
  • packaging: Ensure Linux package scripts work in environments without systemd such as chrooted environments (#​767)

v0.121.0

Compare Source

🛑 Breaking changes 🛑
  • container group ID: Set user's primary group (USER_GID) to prevent container user 10001 being root group. (#​738)
🚀 New components 🚀
  • aesprovider: Add the AES provider to the contrib distribution (#​843)
  • envoyalsreceiver: Add the Envoy ALS receiver to the contrib distribution (#​842)
  • netflowreceiver: Add the NetFlow receiver to the contrib distribution (#​847)
  • s3provider: Add the s3 provider to the contrib distribution (#​546)
  • secretsmanagerprovider: Add the Secrets Manager provider to the contrib distribution (#​844)
💡 Enhancements 💡
  • images: set USER_GID alongside USER_UID (#​662)

v0.120.0

Compare Source

Check the following changelogs on specific components for more details:

Changelog

v0.119.0

Compare Source

🚀 New components 🚀
  • intervalprocessor: Interval processor is now alpha and is included in the contrib and k8s distributions (#​804)
  • signaltometricsconnector: Signal to metrics connector is now alpha and is included in the contrib distribution (#​808)

v0.118.0

Compare Source

🧰 Bug fixes 🧰
  • packaging: Fix Linux package scripts (#​799)

v0.117.0

Compare Source

🚀 New components 🚀
  • libhoneyreceiver: Add libhoneyreceiver to the contrib distribution (#​787)
  • sumconnector: Add sumconnector to the contrib distribution (#​785)

v0.116.1

Compare Source

Check the v0.116.1 contrib changelog and the v0.116.1 core changelog for changelogs on specific components.

Changelog

v0.116.0

Compare Source

🚀 New components 🚀
  • dorisexporter: add doris exporter to otelcol-contrib releases (#​765)
💡 Enhancements 💡
  • contrib: Add failover connector to the contrib distribution. (#​701)
  • contrib: Add redis storage to the contrib distribution (#​768)

v0.115.1

Compare Source

Check the v0.115.0 contrib changelog and the v0.115.0 core changelog for changelogs on specific components.

Changelog

v0.114.0

Compare Source

Check the v0.114.0 contrib changelog and the v0.114.0 core changelog for changelogs on specific components.

Changelog

v0.113.0

Compare Source

Check the v0.113.0 contrib changelog and the v0.113.0 core changelog for changelogs on specific components.

Changelog

v0.112.0

Compare Source

Check the v0.112.0 contrib changelog and the v0.112.0 core changelog for changelogs on specific components.

Changelog

v0.111.0

Compare Source

⚠️ Starting on this release, the logging exporter is no longer available on the core and contrib distros. See open-telemetry/opentelemetry-collector#11337 for instructions on how to migrate to the debug exporter.

🆕 This release adds a new OTLP-only distro. Feel free to leave us feedback on this new distro on the opentelemetry-collector-releases issue tracker.

Check the v0.111.0 contrib changelog and the v0.111.0 core changelog for changelogs on specific components.

Changelog

  • 38a2931 Prepare for v0.111.0 release (#​688)
  • edc8e94 [chore] refactor(contrib): remove unused replace directive for go-connections package (#​677)
  • 545bd7c Remove the deprecated logging exporter (#​682)
  • f754260 Bump actions/checkout from 4.1.7 to 4.2.0 (#​680)
  • 24c11af add appropriate version tag in cmd/builder goreleaser config (#​665)
  • 1e1b2fa [chore] refactor(contrib): remove unused replace directive for gnostic package (#​675)
  • 4800eb6 Add minimal OTLP-only distribution (#​663)

v0.110.0

Compare Source

Check the v0.110.0 contrib changelog and the v0.110.0 core changelog for changelogs on specific components.

Changelog

v0.109.0

Compare Source

Check the v0.109.0 contrib changelog and the [v0.109.0 core changelog](https://redirect.github.com/open-telemetry/opentelemetry-colle


Configuration

📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

@github-actions
Copy link

Terraform Format and Style 🖌success

Terraform Initialization ⚙️success

Terraform Validation 🤖success

Terraform Plan 📖success

Show Plan

terraform
Running plan in HCP Terraform. Output will stream here. Pressing Ctrl-C
will stop streaming the logs, but will not stop the plan running remotely.

Preparing the remote plan...

The remote workspace is configured to work with configuration at
infra relative to the target repository.

Terraform will upload the contents of the following directory,
excluding files or directories as defined by a .terraformignore file
at /home/runner/work/private_server/private_server/.terraformignore (if it is present),
in order to capture the filesystem context the remote workspace expects:
    /home/runner/work/private_server/private_server

To view this run in a browser, visit:
https://app.terraform.io/app/redline/private_server/runs/run-YdCYXMGsJG4vPQ4B

Waiting for the plan to start...

Terraform v1.3.2
on linux_amd64
Initializing plugins and modules...
cloudflare_zone.personal_domain: Refreshing state... [id=cee2af2644f6a3325416173e2d4b44f7]
hcloud_ssh_key.ansible: Refreshing state... [id=8957821]
hcloud_firewall.web_firewall: Refreshing state... [id=603891]
cloudflare_record.aliases["grafana"]: Refreshing state... [id=a63efd438a1e819f0e4215e4835a0f24]
cloudflare_record.aliases["traefik"]: Refreshing state... [id=efbdd0b7c842cec43a43af72a450fcc0]
cloudflare_record.aliases["photoprism"]: Refreshing state... [id=6c61639959eeaf8d547dd411419bcf9a]
cloudflare_record.aliases["grocy"]: Refreshing state... [id=1a98a4348007c72461ab6752f2c7f9df]
cloudflare_record.aliases["auth"]: Refreshing state... [id=59a6c353a0138b64113ad34f046c17dc]
cloudflare_record.aliases["ldap"]: Refreshing state... [id=416e67a40f89597f342029d943e253ed]
hcloud_server.web: Refreshing state... [id=25709912]
hcloud_volume.data: Refreshing state... [id=24743811]
hcloud_firewall_attachment.firewall_assignments: Refreshing state... [id=603891]
cloudflare_record.aaaa: Refreshing state... [id=1f54f8a3794295291a1b5a18ed363416]
cloudflare_record.a: Refreshing state... [id=a44b3519c0443db244e9f2dc5bba8a91]
cloudflare_record.aliases["auth"]: Drift detected (update)
cloudflare_record.aliases["grafana"]: Drift detected (update)
cloudflare_record.aliases["grocy"]: Drift detected (update)
cloudflare_record.aliases["ldap"]: Drift detected (update)
cloudflare_record.aliases["photoprism"]: Drift detected (update)
cloudflare_record.aliases["traefik"]: Drift detected (update)
cloudflare_record.aaaa: Drift detected (update)
hcloud_server.web: Drift detected (update)
cloudflare_record.a: Drift detected (update)

No changes. Your infrastructure matches the configuration.

Terraform has compared your real infrastructure against your configuration
and found no differences, so no changes are needed.

─────────────────────────────────────────────────────────────────────────────

Note: You didn't use the -out option to save this plan, so Terraform can't
guarantee to take exactly these actions if you run "terraform apply" now.

Pushed by: @renovate[bot], Action: pull_request

@renovate renovate bot force-pushed the renovate/otel-opentelemetry-collector-contrib-0.x branch from 12fdb26 to e82024d Compare August 4, 2024 17:23
@github-actions
Copy link

github-actions bot commented Aug 4, 2024

Terraform Format and Style 🖌success

Terraform Initialization ⚙️success

Terraform Validation 🤖success

Terraform Plan 📖success

Show Plan

terraform
Running plan in HCP Terraform. Output will stream here. Pressing Ctrl-C
will stop streaming the logs, but will not stop the plan running remotely.

Preparing the remote plan...

The remote workspace is configured to work with configuration at
infra relative to the target repository.

Terraform will upload the contents of the following directory,
excluding files or directories as defined by a .terraformignore file
at /home/runner/work/private_server/private_server/.terraformignore (if it is present),
in order to capture the filesystem context the remote workspace expects:
    /home/runner/work/private_server/private_server

To view this run in a browser, visit:
https://app.terraform.io/app/redline/private_server/runs/run-mD43TWbR7nZK36zw

Waiting for the plan to start...

Terraform v1.3.2
on linux_amd64
Initializing plugins and modules...
cloudflare_zone.personal_domain: Refreshing state... [id=cee2af2644f6a3325416173e2d4b44f7]
hcloud_ssh_key.ansible: Refreshing state... [id=8957821]
hcloud_firewall.web_firewall: Refreshing state... [id=603891]
cloudflare_record.aliases["grocy"]: Refreshing state... [id=1a98a4348007c72461ab6752f2c7f9df]
cloudflare_record.aliases["ldap"]: Refreshing state... [id=416e67a40f89597f342029d943e253ed]
cloudflare_record.aliases["photoprism"]: Refreshing state... [id=6c61639959eeaf8d547dd411419bcf9a]
cloudflare_record.aliases["grafana"]: Refreshing state... [id=a63efd438a1e819f0e4215e4835a0f24]
cloudflare_record.aliases["auth"]: Refreshing state... [id=59a6c353a0138b64113ad34f046c17dc]
cloudflare_record.aliases["traefik"]: Refreshing state... [id=efbdd0b7c842cec43a43af72a450fcc0]
hcloud_server.web: Refreshing state... [id=25709912]
cloudflare_record.aaaa: Refreshing state... [id=1f54f8a3794295291a1b5a18ed363416]
cloudflare_record.a: Refreshing state... [id=a44b3519c0443db244e9f2dc5bba8a91]
hcloud_volume.data: Refreshing state... [id=24743811]
hcloud_firewall_attachment.firewall_assignments: Refreshing state... [id=603891]
cloudflare_record.aaaa: Drift detected (update)
cloudflare_record.a: Drift detected (update)
hcloud_server.web: Drift detected (update)
cloudflare_record.aliases["traefik"]: Drift detected (update)
cloudflare_record.aliases["auth"]: Drift detected (update)
cloudflare_record.aliases["grafana"]: Drift detected (update)
cloudflare_record.aliases["grocy"]: Drift detected (update)
cloudflare_record.aliases["ldap"]: Drift detected (update)
cloudflare_record.aliases["photoprism"]: Drift detected (update)

No changes. Your infrastructure matches the configuration.

Terraform has compared your real infrastructure against your configuration
and found no differences, so no changes are needed.

─────────────────────────────────────────────────────────────────────────────

Note: You didn't use the -out option to save this plan, so Terraform can't
guarantee to take exactly these actions if you run "terraform apply" now.

Pushed by: @renovate[bot], Action: pull_request

@renovate renovate bot force-pushed the renovate/otel-opentelemetry-collector-contrib-0.x branch from e82024d to fcec7bc Compare August 8, 2024 19:45
@github-actions
Copy link

github-actions bot commented Aug 8, 2024

Terraform Format and Style 🖌success

Terraform Initialization ⚙️success

Terraform Validation 🤖success

Terraform Plan 📖success

Show Plan

terraform
Running plan in HCP Terraform. Output will stream here. Pressing Ctrl-C
will stop streaming the logs, but will not stop the plan running remotely.

Preparing the remote plan...

The remote workspace is configured to work with configuration at
infra relative to the target repository.

Terraform will upload the contents of the following directory,
excluding files or directories as defined by a .terraformignore file
at /home/runner/work/private_server/private_server/.terraformignore (if it is present),
in order to capture the filesystem context the remote workspace expects:
    /home/runner/work/private_server/private_server

To view this run in a browser, visit:
https://app.terraform.io/app/redline/private_server/runs/run-PTNeGvnHB285RK5Q

Waiting for the plan to start...

Terraform v1.3.2
on linux_amd64
Initializing plugins and modules...
hcloud_ssh_key.ansible: Refreshing state... [id=8957821]
hcloud_firewall.web_firewall: Refreshing state... [id=603891]
cloudflare_zone.personal_domain: Refreshing state... [id=cee2af2644f6a3325416173e2d4b44f7]
cloudflare_record.aliases["photoprism"]: Refreshing state... [id=6c61639959eeaf8d547dd411419bcf9a]
cloudflare_record.aliases["traefik"]: Refreshing state... [id=efbdd0b7c842cec43a43af72a450fcc0]
cloudflare_record.aliases["grocy"]: Refreshing state... [id=1a98a4348007c72461ab6752f2c7f9df]
cloudflare_record.aliases["grafana"]: Refreshing state... [id=a63efd438a1e819f0e4215e4835a0f24]
cloudflare_record.aliases["auth"]: Refreshing state... [id=59a6c353a0138b64113ad34f046c17dc]
cloudflare_record.aliases["ldap"]: Refreshing state... [id=416e67a40f89597f342029d943e253ed]
hcloud_server.web: Refreshing state... [id=25709912]
hcloud_volume.data: Refreshing state... [id=24743811]
hcloud_firewall_attachment.firewall_assignments: Refreshing state... [id=603891]
cloudflare_record.a: Refreshing state... [id=a44b3519c0443db244e9f2dc5bba8a91]
cloudflare_record.aaaa: Refreshing state... [id=1f54f8a3794295291a1b5a18ed363416]
cloudflare_record.aaaa: Drift detected (update)
cloudflare_record.aliases["grafana"]: Drift detected (update)
cloudflare_record.aliases["grocy"]: Drift detected (update)
cloudflare_record.aliases["ldap"]: Drift detected (update)
cloudflare_record.aliases["photoprism"]: Drift detected (update)
cloudflare_record.aliases["traefik"]: Drift detected (update)
cloudflare_record.aliases["auth"]: Drift detected (update)
hcloud_server.web: Drift detected (update)
cloudflare_record.a: Drift detected (update)

No changes. Your infrastructure matches the configuration.

Terraform has compared your real infrastructure against your configuration
and found no differences, so no changes are needed.

─────────────────────────────────────────────────────────────────────────────

Note: You didn't use the -out option to save this plan, so Terraform can't
guarantee to take exactly these actions if you run "terraform apply" now.

Pushed by: @renovate[bot], Action: pull_request

@renovate renovate bot force-pushed the renovate/otel-opentelemetry-collector-contrib-0.x branch from fcec7bc to f5257bf Compare August 8, 2024 21:29
@github-actions
Copy link

github-actions bot commented Aug 8, 2024

Terraform Format and Style 🖌success

Terraform Initialization ⚙️success

Terraform Validation 🤖success

Terraform Plan 📖success

Show Plan

terraform
Running plan in HCP Terraform. Output will stream here. Pressing Ctrl-C
will stop streaming the logs, but will not stop the plan running remotely.

Preparing the remote plan...

The remote workspace is configured to work with configuration at
infra relative to the target repository.

Terraform will upload the contents of the following directory,
excluding files or directories as defined by a .terraformignore file
at /home/runner/work/private_server/private_server/.terraformignore (if it is present),
in order to capture the filesystem context the remote workspace expects:
    /home/runner/work/private_server/private_server

To view this run in a browser, visit:
https://app.terraform.io/app/redline/private_server/runs/run-DvCMosqtQTeH3LTG

Waiting for the plan to start...

Terraform v1.3.2
on linux_amd64
Initializing plugins and modules...
hcloud_ssh_key.ansible: Refreshing state... [id=8957821]
hcloud_firewall.web_firewall: Refreshing state... [id=603891]
cloudflare_zone.personal_domain: Refreshing state... [id=cee2af2644f6a3325416173e2d4b44f7]
hcloud_server.web: Refreshing state... [id=25709912]
cloudflare_record.aliases["grafana"]: Refreshing state... [id=a63efd438a1e819f0e4215e4835a0f24]
cloudflare_record.aliases["grocy"]: Refreshing state... [id=1a98a4348007c72461ab6752f2c7f9df]
cloudflare_record.aliases["ldap"]: Refreshing state... [id=416e67a40f89597f342029d943e253ed]
cloudflare_record.aliases["traefik"]: Refreshing state... [id=efbdd0b7c842cec43a43af72a450fcc0]
cloudflare_record.aliases["auth"]: Refreshing state... [id=59a6c353a0138b64113ad34f046c17dc]
cloudflare_record.aliases["photoprism"]: Refreshing state... [id=6c61639959eeaf8d547dd411419bcf9a]
hcloud_volume.data: Refreshing state... [id=24743811]
hcloud_firewall_attachment.firewall_assignments: Refreshing state... [id=603891]
cloudflare_record.aaaa: Refreshing state... [id=1f54f8a3794295291a1b5a18ed363416]
cloudflare_record.a: Refreshing state... [id=a44b3519c0443db244e9f2dc5bba8a91]
cloudflare_record.aliases["grocy"]: Drift detected (update)
cloudflare_record.aliases["ldap"]: Drift detected (update)
cloudflare_record.aliases["photoprism"]: Drift detected (update)
cloudflare_record.aliases["traefik"]: Drift detected (update)
cloudflare_record.aliases["auth"]: Drift detected (update)
cloudflare_record.aliases["grafana"]: Drift detected (update)
hcloud_server.web: Drift detected (update)
cloudflare_record.a: Drift detected (update)
cloudflare_record.aaaa: Drift detected (update)

No changes. Your infrastructure matches the configuration.

Terraform has compared your real infrastructure against your configuration
and found no differences, so no changes are needed.

─────────────────────────────────────────────────────────────────────────────

Note: You didn't use the -out option to save this plan, so Terraform can't
guarantee to take exactly these actions if you run "terraform apply" now.

Pushed by: @renovate[bot], Action: pull_request

@renovate renovate bot force-pushed the renovate/otel-opentelemetry-collector-contrib-0.x branch from f5257bf to 647d247 Compare August 9, 2024 01:02
@github-actions
Copy link

github-actions bot commented Aug 9, 2024

Terraform Format and Style 🖌success

Terraform Initialization ⚙️success

Terraform Validation 🤖success

Terraform Plan 📖success

Show Plan

terraform
Running plan in HCP Terraform. Output will stream here. Pressing Ctrl-C
will stop streaming the logs, but will not stop the plan running remotely.

Preparing the remote plan...

The remote workspace is configured to work with configuration at
infra relative to the target repository.

Terraform will upload the contents of the following directory,
excluding files or directories as defined by a .terraformignore file
at /home/runner/work/private_server/private_server/.terraformignore (if it is present),
in order to capture the filesystem context the remote workspace expects:
    /home/runner/work/private_server/private_server

To view this run in a browser, visit:
https://app.terraform.io/app/redline/private_server/runs/run-5FkBYzbMHMABgnax

Waiting for the plan to start...

Terraform v1.3.2
on linux_amd64
Initializing plugins and modules...
hcloud_ssh_key.ansible: Refreshing state... [id=8957821]
hcloud_firewall.web_firewall: Refreshing state... [id=603891]
cloudflare_zone.personal_domain: Refreshing state... [id=cee2af2644f6a3325416173e2d4b44f7]
cloudflare_record.aliases["auth"]: Refreshing state... [id=59a6c353a0138b64113ad34f046c17dc]
cloudflare_record.aliases["grafana"]: Refreshing state... [id=a63efd438a1e819f0e4215e4835a0f24]
cloudflare_record.aliases["photoprism"]: Refreshing state... [id=6c61639959eeaf8d547dd411419bcf9a]
cloudflare_record.aliases["grocy"]: Refreshing state... [id=1a98a4348007c72461ab6752f2c7f9df]
cloudflare_record.aliases["ldap"]: Refreshing state... [id=416e67a40f89597f342029d943e253ed]
cloudflare_record.aliases["traefik"]: Refreshing state... [id=efbdd0b7c842cec43a43af72a450fcc0]
hcloud_server.web: Refreshing state... [id=25709912]
hcloud_volume.data: Refreshing state... [id=24743811]
cloudflare_record.aaaa: Refreshing state... [id=1f54f8a3794295291a1b5a18ed363416]
hcloud_firewall_attachment.firewall_assignments: Refreshing state... [id=603891]
cloudflare_record.a: Refreshing state... [id=a44b3519c0443db244e9f2dc5bba8a91]
cloudflare_record.a: Drift detected (update)
cloudflare_record.aliases["grafana"]: Drift detected (update)
cloudflare_record.aliases["grocy"]: Drift detected (update)
cloudflare_record.aliases["ldap"]: Drift detected (update)
cloudflare_record.aliases["photoprism"]: Drift detected (update)
cloudflare_record.aliases["traefik"]: Drift detected (update)
cloudflare_record.aliases["auth"]: Drift detected (update)
cloudflare_record.aaaa: Drift detected (update)
hcloud_server.web: Drift detected (update)
╷
│ Warning: Argument is deprecated
│
│   with cloudflare_record.aaaa,
│   on dns.tf line 20, in resource "cloudflare_record" "aaaa":
│   20:   value   = hcloud_server.web.ipv6_address
│
│ `value` is deprecated in favour of `content` and will be removed in the
│ next major release.
╵
╷
│ Warning: Argument is deprecated
│
│   with cloudflare_record.aliases["grafana"],
│   on dns.tf line 37, in resource "cloudflare_record" "aliases":
│   37:   value    = var.server_domain_name
│
│ `value` is deprecated in favour of `content` and will be removed in the
│ next major release.
╵
╷
│ Warning: Argument is deprecated
│
│   with cloudflare_record.aliases["auth"],
│   on dns.tf line 37, in resource "cloudflare_record" "aliases":
│   37:   value    = var.server_domain_name
│
│ `value` is deprecated in favour of `content` and will be removed in the
│ next major release.
╵
╷
│ Warning: Argument is deprecated
│
│   with cloudflare_record.aliases["ldap"],
│   on dns.tf line 37, in resource "cloudflare_record" "aliases":
│   37:   value    = var.server_domain_name
│
│ `value` is deprecated in favour of `content` and will be removed in the
│ next major release.
╵
╷
│ Warning: Argument is deprecated
│
│   with cloudflare_record.aliases["traefik"],
│   on dns.tf line 37, in resource "cloudflare_record" "aliases":
│   37:   value    = var.server_domain_name
│
│ `value` is deprecated in favour of `content` and will be removed in the
│ next major release.
╵
╷
│ Warning: Argument is deprecated
│
│   with cloudflare_record.aliases["grocy"],
│   on dns.tf line 37, in resource "cloudflare_record" "aliases":
│   37:   value    = var.server_domain_name
│
│ `value` is deprecated in favour of `content` and will be removed in the
│ next major release.
╵
╷
│ Warning: Argument is deprecated
│
│   with cloudflare_record.aliases["photoprism"],
│   on dns.tf line 37, in resource "cloudflare_record" "aliases":
│   37:   value    = var.server_domain_name
│
│ `value` is deprecated in favour of `content` and will be removed in the
│ next major release.
╵
╷
│ Warning: Argument is deprecated
│
│   with cloudflare_record.a,
│   on dns.tf line 12, in resource "cloudflare_record" "a":
│   12:   value   = hcloud_server.web.ipv4_address
│
│ `value` is deprecated in favour of `content` and will be removed in the
│ next major release.
╵

No changes. Your infrastructure matches the configuration.

Terraform has compared your real infrastructure against your configuration
and found no differences, so no changes are needed.

─────────────────────────────────────────────────────────────────────────────

Note: You didn't use the -out option to save this plan, so Terraform can't
guarantee to take exactly these actions if you run "terraform apply" now.

Pushed by: @renovate[bot], Action: pull_request

@renovate renovate bot force-pushed the renovate/otel-opentelemetry-collector-contrib-0.x branch from 647d247 to f6d35f0 Compare August 9, 2024 17:08
@github-actions
Copy link

github-actions bot commented Aug 9, 2024

Terraform Format and Style 🖌success

Terraform Initialization ⚙️success

Terraform Validation 🤖success

Terraform Plan 📖success

Show Plan

terraform
Running plan in HCP Terraform. Output will stream here. Pressing Ctrl-C
will stop streaming the logs, but will not stop the plan running remotely.

Preparing the remote plan...

The remote workspace is configured to work with configuration at
infra relative to the target repository.

Terraform will upload the contents of the following directory,
excluding files or directories as defined by a .terraformignore file
at /home/runner/work/private_server/private_server/.terraformignore (if it is present),
in order to capture the filesystem context the remote workspace expects:
    /home/runner/work/private_server/private_server

To view this run in a browser, visit:
https://app.terraform.io/app/redline/private_server/runs/run-s9U3x4UzMtsGX2bf

Waiting for the plan to start...

Terraform v1.3.2
on linux_amd64
Initializing plugins and modules...
hcloud_ssh_key.ansible: Refreshing state... [id=8957821]
hcloud_firewall.web_firewall: Refreshing state... [id=603891]
cloudflare_zone.personal_domain: Refreshing state... [id=cee2af2644f6a3325416173e2d4b44f7]
cloudflare_record.aliases["grocy"]: Refreshing state... [id=1a98a4348007c72461ab6752f2c7f9df]
cloudflare_record.aliases["grafana"]: Refreshing state... [id=a63efd438a1e819f0e4215e4835a0f24]
cloudflare_record.aliases["traefik"]: Refreshing state... [id=efbdd0b7c842cec43a43af72a450fcc0]
cloudflare_record.aliases["auth"]: Refreshing state... [id=59a6c353a0138b64113ad34f046c17dc]
cloudflare_record.aliases["photoprism"]: Refreshing state... [id=6c61639959eeaf8d547dd411419bcf9a]
cloudflare_record.aliases["ldap"]: Refreshing state... [id=416e67a40f89597f342029d943e253ed]
hcloud_server.web: Refreshing state... [id=25709912]
hcloud_volume.data: Refreshing state... [id=24743811]
hcloud_firewall_attachment.firewall_assignments: Refreshing state... [id=603891]
cloudflare_record.aaaa: Refreshing state... [id=1f54f8a3794295291a1b5a18ed363416]
cloudflare_record.a: Refreshing state... [id=a44b3519c0443db244e9f2dc5bba8a91]
cloudflare_record.a: Drift detected (update)
cloudflare_record.aliases["grafana"]: Drift detected (update)
cloudflare_record.aliases["grocy"]: Drift detected (update)
cloudflare_record.aliases["ldap"]: Drift detected (update)
cloudflare_record.aliases["photoprism"]: Drift detected (update)
cloudflare_record.aliases["traefik"]: Drift detected (update)
cloudflare_record.aliases["auth"]: Drift detected (update)
cloudflare_record.aaaa: Drift detected (update)
hcloud_server.web: Drift detected (update)
╷
│ Warning: Argument is deprecated
│
│   with cloudflare_record.aliases["traefik"],
│   on dns.tf line 37, in resource "cloudflare_record" "aliases":
│   37:   value    = var.server_domain_name
│
│ `value` is deprecated in favour of `content` and will be removed in the
│ next major release.
╵
╷
│ Warning: Argument is deprecated
│
│   with cloudflare_record.aliases["photoprism"],
│   on dns.tf line 37, in resource "cloudflare_record" "aliases":
│   37:   value    = var.server_domain_name
│
│ `value` is deprecated in favour of `content` and will be removed in the
│ next major release.
╵
╷
│ Warning: Argument is deprecated
│
│   with cloudflare_record.aliases["auth"],
│   on dns.tf line 37, in resource "cloudflare_record" "aliases":
│   37:   value    = var.server_domain_name
│
│ `value` is deprecated in favour of `content` and will be removed in the
│ next major release.
╵
╷
│ Warning: Argument is deprecated
│
│   with cloudflare_record.aliases["ldap"],
│   on dns.tf line 37, in resource "cloudflare_record" "aliases":
│   37:   value    = var.server_domain_name
│
│ `value` is deprecated in favour of `content` and will be removed in the
│ next major release.
╵
╷
│ Warning: Argument is deprecated
│
│   with cloudflare_record.aliases["grocy"],
│   on dns.tf line 37, in resource "cloudflare_record" "aliases":
│   37:   value    = var.server_domain_name
│
│ `value` is deprecated in favour of `content` and will be removed in the
│ next major release.
╵
╷
│ Warning: Argument is deprecated
│
│   with cloudflare_record.aliases["grafana"],
│   on dns.tf line 37, in resource "cloudflare_record" "aliases":
│   37:   value    = var.server_domain_name
│
│ `value` is deprecated in favour of `content` and will be removed in the
│ next major release.
╵
╷
│ Warning: Argument is deprecated
│
│   with cloudflare_record.aaaa,
│   on dns.tf line 20, in resource "cloudflare_record" "aaaa":
│   20:   value   = hcloud_server.web.ipv6_address
│
│ `value` is deprecated in favour of `content` and will be removed in the
│ next major release.
╵
╷
│ Warning: Argument is deprecated
│
│   with cloudflare_record.a,
│   on dns.tf line 12, in resource "cloudflare_record" "a":
│   12:   value   = hcloud_server.web.ipv4_address
│
│ `value` is deprecated in favour of `content` and will be removed in the
│ next major release.
╵

No changes. Your infrastructure matches the configuration.

Terraform has compared your real infrastructure against your configuration
and found no differences, so no changes are needed.

─────────────────────────────────────────────────────────────────────────────

Note: You didn't use the -out option to save this plan, so Terraform can't
guarantee to take exactly these actions if you run "terraform apply" now.

Pushed by: @renovate[bot], Action: pull_request

@renovate renovate bot force-pushed the renovate/otel-opentelemetry-collector-contrib-0.x branch from f6d35f0 to 3819688 Compare August 13, 2024 18:43
@renovate renovate bot changed the title chore(deps): update otel/opentelemetry-collector-contrib docker tag to v0.106.1 chore(deps): update otel/opentelemetry-collector-contrib docker tag to v0.107.0 Aug 13, 2024
@github-actions
Copy link

Terraform Format and Style 🖌success

Terraform Initialization ⚙️success

Terraform Validation 🤖success

Terraform Plan 📖success

Show Plan

terraform
Running plan in HCP Terraform. Output will stream here. Pressing Ctrl-C
will stop streaming the logs, but will not stop the plan running remotely.

Preparing the remote plan...

The remote workspace is configured to work with configuration at
infra relative to the target repository.

Terraform will upload the contents of the following directory,
excluding files or directories as defined by a .terraformignore file
at /home/runner/work/private_server/private_server/.terraformignore (if it is present),
in order to capture the filesystem context the remote workspace expects:
    /home/runner/work/private_server/private_server

To view this run in a browser, visit:
https://app.terraform.io/app/redline/private_server/runs/run-efvoh2fCeK1adeif

Waiting for the plan to start...

Terraform v1.3.2
on linux_amd64
Initializing plugins and modules...
hcloud_ssh_key.ansible: Refreshing state... [id=8957821]
hcloud_firewall.web_firewall: Refreshing state... [id=603891]
cloudflare_zone.personal_domain: Refreshing state... [id=cee2af2644f6a3325416173e2d4b44f7]
cloudflare_record.aliases["auth"]: Refreshing state... [id=59a6c353a0138b64113ad34f046c17dc]
cloudflare_record.aliases["grafana"]: Refreshing state... [id=a63efd438a1e819f0e4215e4835a0f24]
cloudflare_record.aliases["traefik"]: Refreshing state... [id=efbdd0b7c842cec43a43af72a450fcc0]
cloudflare_record.aliases["ldap"]: Refreshing state... [id=416e67a40f89597f342029d943e253ed]
cloudflare_record.aliases["grocy"]: Refreshing state... [id=1a98a4348007c72461ab6752f2c7f9df]
cloudflare_record.aliases["photoprism"]: Refreshing state... [id=6c61639959eeaf8d547dd411419bcf9a]
hcloud_server.web: Refreshing state... [id=25709912]
hcloud_volume.data: Refreshing state... [id=24743811]
hcloud_firewall_attachment.firewall_assignments: Refreshing state... [id=603891]
cloudflare_record.a: Refreshing state... [id=a44b3519c0443db244e9f2dc5bba8a91]
cloudflare_record.aaaa: Refreshing state... [id=1f54f8a3794295291a1b5a18ed363416]
hcloud_server.web: Drift detected (update)
cloudflare_record.aaaa: Drift detected (update)
cloudflare_record.a: Drift detected (update)
cloudflare_record.aliases["ldap"]: Drift detected (update)
cloudflare_record.aliases["photoprism"]: Drift detected (update)
cloudflare_record.aliases["traefik"]: Drift detected (update)
cloudflare_record.aliases["auth"]: Drift detected (update)
cloudflare_record.aliases["grafana"]: Drift detected (update)
cloudflare_record.aliases["grocy"]: Drift detected (update)
╷
│ Warning: Argument is deprecated
│
│   with cloudflare_record.a,
│   on dns.tf line 12, in resource "cloudflare_record" "a":
│   12:   value   = hcloud_server.web.ipv4_address
│
│ `value` is deprecated in favour of `content` and will be removed in the
│ next major release.
╵
╷
│ Warning: Argument is deprecated
│
│   with cloudflare_record.aaaa,
│   on dns.tf line 20, in resource "cloudflare_record" "aaaa":
│   20:   value   = hcloud_server.web.ipv6_address
│
│ `value` is deprecated in favour of `content` and will be removed in the
│ next major release.
╵
╷
│ Warning: Argument is deprecated
│
│   with cloudflare_record.aliases["ldap"],
│   on dns.tf line 37, in resource "cloudflare_record" "aliases":
│   37:   value    = var.server_domain_name
│
│ `value` is deprecated in favour of `content` and will be removed in the
│ next major release.
╵
╷
│ Warning: Argument is deprecated
│
│   with cloudflare_record.aliases["grocy"],
│   on dns.tf line 37, in resource "cloudflare_record" "aliases":
│   37:   value    = var.server_domain_name
│
│ `value` is deprecated in favour of `content` and will be removed in the
│ next major release.
╵
╷
│ Warning: Argument is deprecated
│
│   with cloudflare_record.aliases["traefik"],
│   on dns.tf line 37, in resource "cloudflare_record" "aliases":
│   37:   value    = var.server_domain_name
│
│ `value` is deprecated in favour of `content` and will be removed in the
│ next major release.
╵
╷
│ Warning: Argument is deprecated
│
│   with cloudflare_record.aliases["photoprism"],
│   on dns.tf line 37, in resource "cloudflare_record" "aliases":
│   37:   value    = var.server_domain_name
│
│ `value` is deprecated in favour of `content` and will be removed in the
│ next major release.
╵
╷
│ Warning: Argument is deprecated
│
│   with cloudflare_record.aliases["auth"],
│   on dns.tf line 37, in resource "cloudflare_record" "aliases":
│   37:   value    = var.server_domain_name
│
│ `value` is deprecated in favour of `content` and will be removed in the
│ next major release.
╵
╷
│ Warning: Argument is deprecated
│
│   with cloudflare_record.aliases["grafana"],
│   on dns.tf line 37, in resource "cloudflare_record" "aliases":
│   37:   value    = var.server_domain_name
│
│ `value` is deprecated in favour of `content` and will be removed in the
│ next major release.
╵

No changes. Your infrastructure matches the configuration.

Terraform has compared your real infrastructure against your configuration
and found no differences, so no changes are needed.

─────────────────────────────────────────────────────────────────────────────

Note: You didn't use the -out option to save this plan, so Terraform can't
guarantee to take exactly these actions if you run "terraform apply" now.

Pushed by: @renovate[bot], Action: pull_request

@renovate renovate bot force-pushed the renovate/otel-opentelemetry-collector-contrib-0.x branch from 3819688 to 85add06 Compare August 14, 2024 21:03
@github-actions
Copy link

Terraform Format and Style 🖌success

Terraform Initialization ⚙️success

Terraform Validation 🤖success

Terraform Plan 📖success

Show Plan

terraform
Running plan in HCP Terraform. Output will stream here. Pressing Ctrl-C
will stop streaming the logs, but will not stop the plan running remotely.

Preparing the remote plan...

The remote workspace is configured to work with configuration at
infra relative to the target repository.

Terraform will upload the contents of the following directory,
excluding files or directories as defined by a .terraformignore file
at /home/runner/work/private_server/private_server/.terraformignore (if it is present),
in order to capture the filesystem context the remote workspace expects:
    /home/runner/work/private_server/private_server

To view this run in a browser, visit:
https://app.terraform.io/app/redline/private_server/runs/run-KybypquECEHV5iHu

Waiting for the plan to start...

Terraform v1.3.2
on linux_amd64
Initializing plugins and modules...
cloudflare_zone.personal_domain: Refreshing state... [id=cee2af2644f6a3325416173e2d4b44f7]
hcloud_ssh_key.ansible: Refreshing state... [id=8957821]
hcloud_firewall.web_firewall: Refreshing state... [id=603891]
cloudflare_record.aliases["grafana"]: Refreshing state... [id=a63efd438a1e819f0e4215e4835a0f24]
cloudflare_record.aliases["ldap"]: Refreshing state... [id=416e67a40f89597f342029d943e253ed]
cloudflare_record.aliases["grocy"]: Refreshing state... [id=1a98a4348007c72461ab6752f2c7f9df]
cloudflare_record.aliases["photoprism"]: Refreshing state... [id=6c61639959eeaf8d547dd411419bcf9a]
cloudflare_record.aliases["auth"]: Refreshing state... [id=59a6c353a0138b64113ad34f046c17dc]
cloudflare_record.aliases["traefik"]: Refreshing state... [id=efbdd0b7c842cec43a43af72a450fcc0]
hcloud_server.web: Refreshing state... [id=25709912]
hcloud_firewall_attachment.firewall_assignments: Refreshing state... [id=603891]
cloudflare_record.a: Refreshing state... [id=a44b3519c0443db244e9f2dc5bba8a91]
hcloud_volume.data: Refreshing state... [id=24743811]
cloudflare_record.aaaa: Refreshing state... [id=1f54f8a3794295291a1b5a18ed363416]
hcloud_server.web: Drift detected (update)
╷
│ Warning: Argument is deprecated
│
│   with cloudflare_record.aliases["grafana"],
│   on dns.tf line 37, in resource "cloudflare_record" "aliases":
│   37:   value    = var.server_domain_name
│
│ `value` is deprecated in favour of `content` and will be removed in the
│ next major release.
╵
╷
│ Warning: Argument is deprecated
│
│   with cloudflare_record.aliases["auth"],
│   on dns.tf line 37, in resource "cloudflare_record" "aliases":
│   37:   value    = var.server_domain_name
│
│ `value` is deprecated in favour of `content` and will be removed in the
│ next major release.
╵
╷
│ Warning: Argument is deprecated
│
│   with cloudflare_record.aliases["photoprism"],
│   on dns.tf line 37, in resource "cloudflare_record" "aliases":
│   37:   value    = var.server_domain_name
│
│ `value` is deprecated in favour of `content` and will be removed in the
│ next major release.
╵
╷
│ Warning: Argument is deprecated
│
│   with cloudflare_record.aliases["traefik"],
│   on dns.tf line 37, in resource "cloudflare_record" "aliases":
│   37:   value    = var.server_domain_name
│
│ `value` is deprecated in favour of `content` and will be removed in the
│ next major release.
╵
╷
│ Warning: Argument is deprecated
│
│   with cloudflare_record.aliases["ldap"],
│   on dns.tf line 37, in resource "cloudflare_record" "aliases":
│   37:   value    = var.server_domain_name
│
│ `value` is deprecated in favour of `content` and will be removed in the
│ next major release.
╵
╷
│ Warning: Argument is deprecated
│
│   with cloudflare_record.aliases["grocy"],
│   on dns.tf line 37, in resource "cloudflare_record" "aliases":
│   37:   value    = var.server_domain_name
│
│ `value` is deprecated in favour of `content` and will be removed in the
│ next major release.
╵
╷
│ Warning: Argument is deprecated
│
│   with cloudflare_record.a,
│   on dns.tf line 12, in resource "cloudflare_record" "a":
│   12:   value   = hcloud_server.web.ipv4_address
│
│ `value` is deprecated in favour of `content` and will be removed in the
│ next major release.
╵
╷
│ Warning: Argument is deprecated
│
│   with cloudflare_record.aaaa,
│   on dns.tf line 20, in resource "cloudflare_record" "aaaa":
│   20:   value   = hcloud_server.web.ipv6_address
│
│ `value` is deprecated in favour of `content` and will be removed in the
│ next major release.
╵

Terraform used the selected providers to generate the following execution
plan. Resource actions are indicated with the following symbols:
  ~ update in-place

Terraform will perform the following actions:

  # hcloud_server.web will be updated in-place
  ~ resource "hcloud_server" "web" {
        id                         = "25709912"
        name                       = "web"
      ~ server_type                = "cpx21" -> "cx22"
      + shutdown_before_deletion   = false
        # (19 unchanged attributes hidden)

        # (1 unchanged block hidden)
    }

Plan: 0 to add, 1 to change, 0 to destroy.

─────────────────────────────────────────────────────────────────────────────

Note: You didn't use the -out option to save this plan, so Terraform can't
guarantee to take exactly these actions if you run "terraform apply" now.

Pushed by: @renovate[bot], Action: pull_request

@renovate renovate bot force-pushed the renovate/otel-opentelemetry-collector-contrib-0.x branch from 85add06 to cebec93 Compare August 14, 2024 21:04
@github-actions
Copy link

Terraform Format and Style 🖌success

Terraform Initialization ⚙️success

Terraform Validation 🤖success

Terraform Plan 📖success

Show Plan

terraform
Running plan in HCP Terraform. Output will stream here. Pressing Ctrl-C
will stop streaming the logs, but will not stop the plan running remotely.

Preparing the remote plan...

The remote workspace is configured to work with configuration at
infra relative to the target repository.

Terraform will upload the contents of the following directory,
excluding files or directories as defined by a .terraformignore file
at /home/runner/work/private_server/private_server/.terraformignore (if it is present),
in order to capture the filesystem context the remote workspace expects:
    /home/runner/work/private_server/private_server

To view this run in a browser, visit:
https://app.terraform.io/app/redline/private_server/runs/run-Sn5mYVefYxtdwtS8

Waiting for the plan to start...

Terraform v1.3.2
on linux_amd64
Initializing plugins and modules...
cloudflare_zone.personal_domain: Refreshing state... [id=cee2af2644f6a3325416173e2d4b44f7]
hcloud_ssh_key.ansible: Refreshing state... [id=8957821]
hcloud_firewall.web_firewall: Refreshing state... [id=603891]
hcloud_server.web: Refreshing state... [id=25709912]
hcloud_firewall_attachment.firewall_assignments: Refreshing state... [id=603891]
hcloud_volume.data: Refreshing state... [id=24743811]
cloudflare_record.aliases["traefik"]: Refreshing state... [id=efbdd0b7c842cec43a43af72a450fcc0]
cloudflare_record.aaaa: Refreshing state... [id=1f54f8a3794295291a1b5a18ed363416]
cloudflare_record.a: Refreshing state... [id=a44b3519c0443db244e9f2dc5bba8a91]
cloudflare_record.aliases["auth"]: Refreshing state... [id=59a6c353a0138b64113ad34f046c17dc]
cloudflare_record.aliases["grocy"]: Refreshing state... [id=1a98a4348007c72461ab6752f2c7f9df]
cloudflare_record.aliases["ldap"]: Refreshing state... [id=416e67a40f89597f342029d943e253ed]
cloudflare_record.aliases["grafana"]: Refreshing state... [id=a63efd438a1e819f0e4215e4835a0f24]
cloudflare_record.aliases["photoprism"]: Refreshing state... [id=6c61639959eeaf8d547dd411419bcf9a]
╷
│ Warning: Argument is deprecated
│
│   with cloudflare_record.aaaa,
│   on dns.tf line 20, in resource "cloudflare_record" "aaaa":
│   20:   value   = hcloud_server.web.ipv6_address
│
│ `value` is deprecated in favour of `content` and will be removed in the
│ next major release.
╵
╷
│ Warning: Argument is deprecated
│
│   with cloudflare_record.a,
│   on dns.tf line 12, in resource "cloudflare_record" "a":
│   12:   value   = hcloud_server.web.ipv4_address
│
│ `value` is deprecated in favour of `content` and will be removed in the
│ next major release.
╵
╷
│ Warning: Argument is deprecated
│
│   with cloudflare_record.aliases["grafana"],
│   on dns.tf line 37, in resource "cloudflare_record" "aliases":
│   37:   value    = var.server_domain_name
│
│ `value` is deprecated in favour of `content` and will be removed in the
│ next major release.
╵
╷
│ Warning: Argument is deprecated
│
│   with cloudflare_record.aliases["grocy"],
│   on dns.tf line 37, in resource "cloudflare_record" "aliases":
│   37:   value    = var.server_domain_name
│
│ `value` is deprecated in favour of `content` and will be removed in the
│ next major release.
╵
╷
│ Warning: Argument is deprecated
│
│   with cloudflare_record.aliases["photoprism"],
│   on dns.tf line 37, in resource "cloudflare_record" "aliases":
│   37:   value    = var.server_domain_name
│
│ `value` is deprecated in favour of `content` and will be removed in the
│ next major release.
╵
╷
│ Warning: Argument is deprecated
│
│   with cloudflare_record.aliases["ldap"],
│   on dns.tf line 37, in resource "cloudflare_record" "aliases":
│   37:   value    = var.server_domain_name
│
│ `value` is deprecated in favour of `content` and will be removed in the
│ next major release.
╵
╷
│ Warning: Argument is deprecated
│
│   with cloudflare_record.aliases["auth"],
│   on dns.tf line 37, in resource "cloudflare_record" "aliases":
│   37:   value    = var.server_domain_name
│
│ `value` is deprecated in favour of `content` and will be removed in the
│ next major release.
╵
╷
│ Warning: Argument is deprecated
│
│   with cloudflare_record.aliases["traefik"],
│   on dns.tf line 37, in resource "cloudflare_record" "aliases":
│   37:   value    = var.server_domain_name
│
│ `value` is deprecated in favour of `content` and will be removed in the
│ next major release.
╵

Terraform used the selected providers to generate the following execution
plan. Resource actions are indicated with the following symbols:
  ~ update in-place

Terraform will perform the following actions:

  # hcloud_server.web will be updated in-place
  ~ resource "hcloud_server" "web" {
        id                         = "25709912"
        name                       = "web"
      ~ server_type                = "cpx21" -> "cx22"
      + shutdown_before_deletion   = false
        # (19 unchanged attributes hidden)

        # (1 unchanged block hidden)
    }

Plan: 0 to add, 1 to change, 0 to destroy.

─────────────────────────────────────────────────────────────────────────────

Note: You didn't use the -out option to save this plan, so Terraform can't
guarantee to take exactly these actions if you run "terraform apply" now.

Pushed by: @renovate[bot], Action: pull_request

@renovate renovate bot force-pushed the renovate/otel-opentelemetry-collector-contrib-0.x branch from cebec93 to d2b3d8f Compare August 14, 2024 21:28
@github-actions
Copy link

Terraform Format and Style 🖌success

Terraform Initialization ⚙️success

Terraform Validation 🤖success

Terraform Plan 📖success

Show Plan

terraform
Running plan in HCP Terraform. Output will stream here. Pressing Ctrl-C
will stop streaming the logs, but will not stop the plan running remotely.

Preparing the remote plan...

The remote workspace is configured to work with configuration at
infra relative to the target repository.

Terraform will upload the contents of the following directory,
excluding files or directories as defined by a .terraformignore file
at /home/runner/work/private_server/private_server/.terraformignore (if it is present),
in order to capture the filesystem context the remote workspace expects:
    /home/runner/work/private_server/private_server

To view this run in a browser, visit:
https://app.terraform.io/app/redline/private_server/runs/run-WyhphbD2GBZCWwjP

Waiting for the plan to start...

Terraform v1.3.2
on linux_amd64
Initializing plugins and modules...
hcloud_ssh_key.ansible: Refreshing state... [id=8957821]
hcloud_firewall.web_firewall: Refreshing state... [id=603891]
cloudflare_zone.personal_domain: Refreshing state... [id=cee2af2644f6a3325416173e2d4b44f7]
cloudflare_record.aliases["auth"]: Refreshing state... [id=59a6c353a0138b64113ad34f046c17dc]
cloudflare_record.aliases["grocy"]: Refreshing state... [id=1a98a4348007c72461ab6752f2c7f9df]
cloudflare_record.aliases["grafana"]: Refreshing state... [id=a63efd438a1e819f0e4215e4835a0f24]
cloudflare_record.aliases["ldap"]: Refreshing state... [id=416e67a40f89597f342029d943e253ed]
cloudflare_record.aliases["photoprism"]: Refreshing state... [id=6c61639959eeaf8d547dd411419bcf9a]
cloudflare_record.aliases["traefik"]: Refreshing state... [id=efbdd0b7c842cec43a43af72a450fcc0]
hcloud_server.web: Refreshing state... [id=51758402]
hcloud_firewall_attachment.firewall_assignments: Refreshing state... [id=603891]
cloudflare_record.a: Refreshing state... [id=a44b3519c0443db244e9f2dc5bba8a91]
hcloud_volume.data: Refreshing state... [id=24743811]
cloudflare_record.aaaa: Refreshing state... [id=1f54f8a3794295291a1b5a18ed363416]
hcloud_firewall.web_firewall: Drift detected (update)
hcloud_server.web: Drift detected (update)
╷
│ Warning: Argument is deprecated
│
│   with cloudflare_record.aliases["auth"],
│   on dns.tf line 37, in resource "cloudflare_record" "aliases":
│   37:   value    = var.server_domain_name
│
│ `value` is deprecated in favour of `content` and will be removed in the
│ next major release.
╵
╷
│ Warning: Argument is deprecated
│
│   with cloudflare_record.aliases["grocy"],
│   on dns.tf line 37, in resource "cloudflare_record" "aliases":
│   37:   value    = var.server_domain_name
│
│ `value` is deprecated in favour of `content` and will be removed in the
│ next major release.
╵
╷
│ Warning: Argument is deprecated
│
│   with cloudflare_record.aliases["grafana"],
│   on dns.tf line 37, in resource "cloudflare_record" "aliases":
│   37:   value    = var.server_domain_name
│
│ `value` is deprecated in favour of `content` and will be removed in the
│ next major release.
╵
╷
│ Warning: Argument is deprecated
│
│   with cloudflare_record.aliases["ldap"],
│   on dns.tf line 37, in resource "cloudflare_record" "aliases":
│   37:   value    = var.server_domain_name
│
│ `value` is deprecated in favour of `content` and will be removed in the
│ next major release.
╵
╷
│ Warning: Argument is deprecated
│
│   with cloudflare_record.aliases["photoprism"],
│   on dns.tf line 37, in resource "cloudflare_record" "aliases":
│   37:   value    = var.server_domain_name
│
│ `value` is deprecated in favour of `content` and will be removed in the
│ next major release.
╵
╷
│ Warning: Argument is deprecated
│
│   with cloudflare_record.aliases["traefik"],
│   on dns.tf line 37, in resource "cloudflare_record" "aliases":
│   37:   value    = var.server_domain_name
│
│ `value` is deprecated in favour of `content` and will be removed in the
│ next major release.
╵
╷
│ Warning: Argument is deprecated
│
│   with cloudflare_record.a,
│   on dns.tf line 12, in resource "cloudflare_record" "a":
│   12:   value   = hcloud_server.web.ipv4_address
│
│ `value` is deprecated in favour of `content` and will be removed in the
│ next major release.
╵
╷
│ Warning: Argument is deprecated
│
│   with cloudflare_record.aaaa,
│   on dns.tf line 20, in resource "cloudflare_record" "aaaa":
│   20:   value   = hcloud_server.web.ipv6_address
│
│ `value` is deprecated in favour of `content` and will be removed in the
│ next major release.
╵

No changes. Your infrastructure matches the configuration.

Terraform has compared your real infrastructure against your configuration
and found no differences, so no changes are needed.

─────────────────────────────────────────────────────────────────────────────

Note: You didn't use the -out option to save this plan, so Terraform can't
guarantee to take exactly these actions if you run "terraform apply" now.

Pushed by: @renovate[bot], Action: pull_request

@github-actions
Copy link

Terraform Format and Style 🖌success

Terraform Initialization ⚙️success

Terraform Validation 🤖success

Terraform Plan 📖success

Show Plan

terraform
Running plan in HCP Terraform. Output will stream here. Pressing Ctrl-C
will stop streaming the logs, but will not stop the plan running remotely.

Preparing the remote plan...

The remote workspace is configured to work with configuration at
infra relative to the target repository.

Terraform will upload the contents of the following directory,
excluding files or directories as defined by a .terraformignore file
at /home/runner/work/private_server/private_server/.terraformignore (if it is present),
in order to capture the filesystem context the remote workspace expects:
    /home/runner/work/private_server/private_server

To view this run in a browser, visit:
https://app.terraform.io/app/redline/private_server/runs/run-u4XFjBhoJkdLfX3J

Waiting for the plan to start...

Terraform v1.3.2
on linux_amd64
Initializing plugins and modules...
cloudflare_zone.personal_domain: Refreshing state... [id=cee2af2644f6a3325416173e2d4b44f7]
hcloud_ssh_key.ansible: Refreshing state... [id=8957821]
hcloud_firewall.web_firewall: Refreshing state... [id=603891]
cloudflare_record.aliases["photoprism"]: Refreshing state... [id=6c61639959eeaf8d547dd411419bcf9a]
cloudflare_record.aliases["grafana"]: Refreshing state... [id=a63efd438a1e819f0e4215e4835a0f24]
cloudflare_record.aliases["grocy"]: Refreshing state... [id=1a98a4348007c72461ab6752f2c7f9df]
cloudflare_record.aliases["auth"]: Refreshing state... [id=59a6c353a0138b64113ad34f046c17dc]
cloudflare_record.aliases["traefik"]: Refreshing state... [id=efbdd0b7c842cec43a43af72a450fcc0]
cloudflare_record.aliases["ldap"]: Refreshing state... [id=416e67a40f89597f342029d943e253ed]
hcloud_server.web: Refreshing state... [id=51760523]
hcloud_volume.data: Refreshing state... [id=24743811]
hcloud_firewall_attachment.firewall_assignments: Refreshing state... [id=603891]
cloudflare_record.aaaa: Refreshing state... [id=1f54f8a3794295291a1b5a18ed363416]
cloudflare_record.a: Refreshing state... [id=a44b3519c0443db244e9f2dc5bba8a91]
hcloud_server.web: Drift detected (update)
cloudflare_record.aaaa: Drift detected (delete)
cloudflare_record.aliases["grafana"]: Drift detected (delete)
cloudflare_record.aliases["grocy"]: Drift detected (delete)
cloudflare_record.aliases["ldap"]: Drift detected (delete)
cloudflare_record.aliases["photoprism"]: Drift detected (delete)
cloudflare_record.aliases["traefik"]: Drift detected (delete)
cloudflare_record.aliases["auth"]: Drift detected (delete)
hcloud_firewall.web_firewall: Drift detected (update)
cloudflare_record.a: Drift detected (delete)

Terraform used the selected providers to generate the following execution
plan. Resource actions are indicated with the following symbols:
  + create

Terraform will perform the following actions:

  # cloudflare_record.a will be created
  + resource "cloudflare_record" "a" {
      + allow_overwrite = false
      + content         = "78.47.192.97"
      + created_on      = (known after apply)
      + hostname        = (known after apply)
      + id              = (known after apply)
      + metadata        = (known after apply)
      + modified_on     = (known after apply)
      + name            = "pascal.build"
      + proxiable       = (known after apply)
      + ttl             = 300
      + type            = "A"
      + value           = (known after apply)
      + zone_id         = "cee2af2644f6a3325416173e2d4b44f7"
    }

  # cloudflare_record.aaaa will be created
  + resource "cloudflare_record" "aaaa" {
      + allow_overwrite = false
      + content         = "2a01:4f8:c2c:1ff1::1"
      + created_on      = (known after apply)
      + hostname        = (known after apply)
      + id              = (known after apply)
      + metadata        = (known after apply)
      + modified_on     = (known after apply)
      + name            = "pascal.build"
      + proxiable       = (known after apply)
      + ttl             = 300
      + type            = "AAAA"
      + value           = (known after apply)
      + zone_id         = "cee2af2644f6a3325416173e2d4b44f7"
    }

  # cloudflare_record.aliases["auth"] will be created
  + resource "cloudflare_record" "aliases" {
      + allow_overwrite = false
      + content         = "pascal.build"
      + created_on      = (known after apply)
      + hostname        = (known after apply)
      + id              = (known after apply)
      + metadata        = (known after apply)
      + modified_on     = (known after apply)
      + name            = "auth"
      + proxiable       = (known after apply)
      + ttl             = 300
      + type            = "CNAME"
      + value           = (known after apply)
      + zone_id         = "cee2af2644f6a3325416173e2d4b44f7"
    }

  # cloudflare_record.aliases["grafana"] will be created
  + resource "cloudflare_record" "aliases" {
      + allow_overwrite = false
      + content         = "pascal.build"
      + created_on      = (known after apply)
      + hostname        = (known after apply)
      + id              = (known after apply)
      + metadata        = (known after apply)
      + modified_on     = (known after apply)
      + name            = "grafana"
      + proxiable       = (known after apply)
      + ttl             = 300
      + type            = "CNAME"
      + value           = (known after apply)
      + zone_id         = "cee2af2644f6a3325416173e2d4b44f7"
    }

  # cloudflare_record.aliases["grocy"] will be created
  + resource "cloudflare_record" "aliases" {
      + allow_overwrite = false
      + content         = "pascal.build"
      + created_on      = (known after apply)
      + hostname        = (known after apply)
      + id              = (known after apply)
      + metadata        = (known after apply)
      + modified_on     = (known after apply)
      + name            = "grocy"
      + proxiable       = (known after apply)
      + ttl             = 300
      + type            = "CNAME"
      + value           = (known after apply)
      + zone_id         = "cee2af2644f6a3325416173e2d4b44f7"
    }

  # cloudflare_record.aliases["ldap"] will be created
  + resource "cloudflare_record" "aliases" {
      + allow_overwrite = false
      + content         = "pascal.build"
      + created_on      = (known after apply)
      + hostname        = (known after apply)
      + id              = (known after apply)
      + metadata        = (known after apply)
      + modified_on     = (known after apply)
      + name            = "ldap"
      + proxiable       = (known after apply)
      + ttl             = 300
      + type            = "CNAME"
      + value           = (known after apply)
      + zone_id         = "cee2af2644f6a3325416173e2d4b44f7"
    }

  # cloudflare_record.aliases["photoprism"] will be created
  + resource "cloudflare_record" "aliases" {
      + allow_overwrite = false
      + content         = "pascal.build"
      + created_on      = (known after apply)
      + hostname        = (known after apply)
      + id              = (known after apply)
      + metadata        = (known after apply)
      + modified_on     = (known after apply)
      + name            = "photoprism"
      + proxiable       = (known after apply)
      + ttl             = 300
      + type            = "CNAME"
      + value           = (known after apply)
      + zone_id         = "cee2af2644f6a3325416173e2d4b44f7"
    }

  # cloudflare_record.aliases["traefik"] will be created
  + resource "cloudflare_record" "aliases" {
      + allow_overwrite = false
      + content         = "pascal.build"
      + created_on      = (known after apply)
      + hostname        = (known after apply)
      + id              = (known after apply)
      + metadata        = (known after apply)
      + modified_on     = (known after apply)
      + name            = "traefik"
      + proxiable       = (known after apply)
      + ttl             = 300
      + type            = "CNAME"
      + value           = (known after apply)
      + zone_id         = "cee2af2644f6a3325416173e2d4b44f7"
    }

Plan: 8 to add, 0 to change, 0 to destroy.

─────────────────────────────────────────────────────────────────────────────

Note: You didn't use the -out option to save this plan, so Terraform can't
guarantee to take exactly these actions if you run "terraform apply" now.

Pushed by: @renovate[bot], Action: pull_request

@renovate renovate bot force-pushed the renovate/otel-opentelemetry-collector-contrib-0.x branch from 4a03280 to 1e88302 Compare December 2, 2025 14:51
@renovate renovate bot changed the title chore(deps): update otel/opentelemetry-collector-contrib docker tag to v0.140.1 chore(deps): update otel/opentelemetry-collector-contrib docker tag to v0.141.0 Dec 2, 2025
@github-actions
Copy link

github-actions bot commented Dec 2, 2025

Terraform Format and Style 🖌success

Terraform Initialization ⚙️success

Terraform Validation 🤖success

Terraform Plan 📖success

Show Plan

terraform
Running plan in HCP Terraform. Output will stream here. Pressing Ctrl-C
will stop streaming the logs, but will not stop the plan running remotely.

Preparing the remote plan...

The remote workspace is configured to work with configuration at
infra relative to the target repository.

Terraform will upload the contents of the following directory,
excluding files or directories as defined by a .terraformignore file
at /home/runner/work/private_server/private_server/.terraformignore (if it is present),
in order to capture the filesystem context the remote workspace expects:
    /home/runner/work/private_server/private_server

To view this run in a browser, visit:
https://app.terraform.io/app/redline/private_server/runs/run-Kb24rmHtwAZCM5VZ

Waiting for the plan to start...

Terraform v1.3.2
on linux_amd64
Initializing plugins and modules...
cloudflare_zone.personal_domain: Refreshing state... [id=cee2af2644f6a3325416173e2d4b44f7]
hcloud_ssh_key.ansible: Refreshing state... [id=8957821]
hcloud_firewall.web_firewall: Refreshing state... [id=603891]
cloudflare_record.aliases["grocy"]: Refreshing state... [id=1a98a4348007c72461ab6752f2c7f9df]
cloudflare_record.aliases["ldap"]: Refreshing state... [id=416e67a40f89597f342029d943e253ed]
cloudflare_record.aliases["grafana"]: Refreshing state... [id=a63efd438a1e819f0e4215e4835a0f24]
cloudflare_record.aliases["photoprism"]: Refreshing state... [id=6c61639959eeaf8d547dd411419bcf9a]
cloudflare_record.aliases["traefik"]: Refreshing state... [id=efbdd0b7c842cec43a43af72a450fcc0]
cloudflare_record.aliases["auth"]: Refreshing state... [id=59a6c353a0138b64113ad34f046c17dc]
hcloud_server.web: Refreshing state... [id=51760523]
hcloud_volume.data: Refreshing state... [id=24743811]
hcloud_firewall_attachment.firewall_assignments: Refreshing state... [id=603891]
cloudflare_record.aaaa: Refreshing state... [id=1f54f8a3794295291a1b5a18ed363416]
cloudflare_record.a: Refreshing state... [id=a44b3519c0443db244e9f2dc5bba8a91]
cloudflare_record.a: Drift detected (delete)
hcloud_server.web: Drift detected (update)
cloudflare_record.aliases["photoprism"]: Drift detected (delete)
cloudflare_record.aliases["traefik"]: Drift detected (delete)
cloudflare_record.aliases["auth"]: Drift detected (delete)
cloudflare_record.aliases["grafana"]: Drift detected (delete)
cloudflare_record.aliases["grocy"]: Drift detected (delete)
cloudflare_record.aliases["ldap"]: Drift detected (delete)
hcloud_firewall.web_firewall: Drift detected (update)
cloudflare_record.aaaa: Drift detected (delete)

Terraform used the selected providers to generate the following execution
plan. Resource actions are indicated with the following symbols:
  + create

Terraform will perform the following actions:

  # cloudflare_record.a will be created
  + resource "cloudflare_record" "a" {
      + allow_overwrite = false
      + content         = "78.47.192.97"
      + created_on      = (known after apply)
      + hostname        = (known after apply)
      + id              = (known after apply)
      + metadata        = (known after apply)
      + modified_on     = (known after apply)
      + name            = "pascal.build"
      + proxiable       = (known after apply)
      + ttl             = 300
      + type            = "A"
      + value           = (known after apply)
      + zone_id         = "cee2af2644f6a3325416173e2d4b44f7"
    }

  # cloudflare_record.aaaa will be created
  + resource "cloudflare_record" "aaaa" {
      + allow_overwrite = false
      + content         = "2a01:4f8:c2c:1ff1::1"
      + created_on      = (known after apply)
      + hostname        = (known after apply)
      + id              = (known after apply)
      + metadata        = (known after apply)
      + modified_on     = (known after apply)
      + name            = "pascal.build"
      + proxiable       = (known after apply)
      + ttl             = 300
      + type            = "AAAA"
      + value           = (known after apply)
      + zone_id         = "cee2af2644f6a3325416173e2d4b44f7"
    }

  # cloudflare_record.aliases["auth"] will be created
  + resource "cloudflare_record" "aliases" {
      + allow_overwrite = false
      + content         = "pascal.build"
      + created_on      = (known after apply)
      + hostname        = (known after apply)
      + id              = (known after apply)
      + metadata        = (known after apply)
      + modified_on     = (known after apply)
      + name            = "auth"
      + proxiable       = (known after apply)
      + ttl             = 300
      + type            = "CNAME"
      + value           = (known after apply)
      + zone_id         = "cee2af2644f6a3325416173e2d4b44f7"
    }

  # cloudflare_record.aliases["grafana"] will be created
  + resource "cloudflare_record" "aliases" {
      + allow_overwrite = false
      + content         = "pascal.build"
      + created_on      = (known after apply)
      + hostname        = (known after apply)
      + id              = (known after apply)
      + metadata        = (known after apply)
      + modified_on     = (known after apply)
      + name            = "grafana"
      + proxiable       = (known after apply)
      + ttl             = 300
      + type            = "CNAME"
      + value           = (known after apply)
      + zone_id         = "cee2af2644f6a3325416173e2d4b44f7"
    }

  # cloudflare_record.aliases["grocy"] will be created
  + resource "cloudflare_record" "aliases" {
      + allow_overwrite = false
      + content         = "pascal.build"
      + created_on      = (known after apply)
      + hostname        = (known after apply)
      + id              = (known after apply)
      + metadata        = (known after apply)
      + modified_on     = (known after apply)
      + name            = "grocy"
      + proxiable       = (known after apply)
      + ttl             = 300
      + type            = "CNAME"
      + value           = (known after apply)
      + zone_id         = "cee2af2644f6a3325416173e2d4b44f7"
    }

  # cloudflare_record.aliases["ldap"] will be created
  + resource "cloudflare_record" "aliases" {
      + allow_overwrite = false
      + content         = "pascal.build"
      + created_on      = (known after apply)
      + hostname        = (known after apply)
      + id              = (known after apply)
      + metadata        = (known after apply)
      + modified_on     = (known after apply)
      + name            = "ldap"
      + proxiable       = (known after apply)
      + ttl             = 300
      + type            = "CNAME"
      + value           = (known after apply)
      + zone_id         = "cee2af2644f6a3325416173e2d4b44f7"
    }

  # cloudflare_record.aliases["photoprism"] will be created
  + resource "cloudflare_record" "aliases" {
      + allow_overwrite = false
      + content         = "pascal.build"
      + created_on      = (known after apply)
      + hostname        = (known after apply)
      + id              = (known after apply)
      + metadata        = (known after apply)
      + modified_on     = (known after apply)
      + name            = "photoprism"
      + proxiable       = (known after apply)
      + ttl             = 300
      + type            = "CNAME"
      + value           = (known after apply)
      + zone_id         = "cee2af2644f6a3325416173e2d4b44f7"
    }

  # cloudflare_record.aliases["traefik"] will be created
  + resource "cloudflare_record" "aliases" {
      + allow_overwrite = false
      + content         = "pascal.build"
      + created_on      = (known after apply)
      + hostname        = (known after apply)
      + id              = (known after apply)
      + metadata        = (known after apply)
      + modified_on     = (known after apply)
      + name            = "traefik"
      + proxiable       = (known after apply)
      + ttl             = 300
      + type            = "CNAME"
      + value           = (known after apply)
      + zone_id         = "cee2af2644f6a3325416173e2d4b44f7"
    }

Plan: 8 to add, 0 to change, 0 to destroy.

─────────────────────────────────────────────────────────────────────────────

Note: You didn't use the -out option to save this plan, so Terraform can't
guarantee to take exactly these actions if you run "terraform apply" now.

Pushed by: @renovate[bot], Action: pull_request

@renovate renovate bot force-pushed the renovate/otel-opentelemetry-collector-contrib-0.x branch from 1e88302 to e8885de Compare December 16, 2025 05:27
@renovate renovate bot changed the title chore(deps): update otel/opentelemetry-collector-contrib docker tag to v0.141.0 chore(deps): update otel/opentelemetry-collector-contrib docker tag to v0.142.0 Dec 16, 2025
@github-actions
Copy link

Terraform Format and Style 🖌success

Terraform Initialization ⚙️success

Terraform Validation 🤖success

Terraform Plan 📖success

Show Plan

terraform
Running plan in HCP Terraform. Output will stream here. Pressing Ctrl-C
will stop streaming the logs, but will not stop the plan running remotely.

Preparing the remote plan...

The remote workspace is configured to work with configuration at
infra relative to the target repository.

Terraform will upload the contents of the following directory,
excluding files or directories as defined by a .terraformignore file
at /home/runner/work/private_server/private_server/.terraformignore (if it is present),
in order to capture the filesystem context the remote workspace expects:
    /home/runner/work/private_server/private_server

To view this run in a browser, visit:
https://app.terraform.io/app/redline/private_server/runs/run-hm8RDmpkMywqe69B

Waiting for the plan to start...

Terraform v1.3.2
on linux_amd64
Initializing plugins and modules...
cloudflare_zone.personal_domain: Refreshing state... [id=cee2af2644f6a3325416173e2d4b44f7]
hcloud_ssh_key.ansible: Refreshing state... [id=8957821]
hcloud_firewall.web_firewall: Refreshing state... [id=603891]
cloudflare_record.aliases["traefik"]: Refreshing state... [id=efbdd0b7c842cec43a43af72a450fcc0]
cloudflare_record.aliases["auth"]: Refreshing state... [id=59a6c353a0138b64113ad34f046c17dc]
cloudflare_record.aliases["photoprism"]: Refreshing state... [id=6c61639959eeaf8d547dd411419bcf9a]
cloudflare_record.aliases["grafana"]: Refreshing state... [id=a63efd438a1e819f0e4215e4835a0f24]
cloudflare_record.aliases["grocy"]: Refreshing state... [id=1a98a4348007c72461ab6752f2c7f9df]
cloudflare_record.aliases["ldap"]: Refreshing state... [id=416e67a40f89597f342029d943e253ed]
hcloud_server.web: Refreshing state... [id=51760523]
hcloud_volume.data: Refreshing state... [id=24743811]
hcloud_firewall_attachment.firewall_assignments: Refreshing state... [id=603891]
cloudflare_record.aaaa: Refreshing state... [id=1f54f8a3794295291a1b5a18ed363416]
cloudflare_record.a: Refreshing state... [id=a44b3519c0443db244e9f2dc5bba8a91]
hcloud_server.web: Drift detected (update)
cloudflare_record.a: Drift detected (delete)
cloudflare_record.aaaa: Drift detected (delete)
hcloud_firewall.web_firewall: Drift detected (update)
cloudflare_record.aliases["grocy"]: Drift detected (delete)
cloudflare_record.aliases["ldap"]: Drift detected (delete)
cloudflare_record.aliases["photoprism"]: Drift detected (delete)
cloudflare_record.aliases["traefik"]: Drift detected (delete)
cloudflare_record.aliases["auth"]: Drift detected (delete)
cloudflare_record.aliases["grafana"]: Drift detected (delete)

Terraform used the selected providers to generate the following execution
plan. Resource actions are indicated with the following symbols:
  + create

Terraform will perform the following actions:

  # cloudflare_record.a will be created
  + resource "cloudflare_record" "a" {
      + allow_overwrite = false
      + content         = "78.47.192.97"
      + created_on      = (known after apply)
      + hostname        = (known after apply)
      + id              = (known after apply)
      + metadata        = (known after apply)
      + modified_on     = (known after apply)
      + name            = "pascal.build"
      + proxiable       = (known after apply)
      + ttl             = 300
      + type            = "A"
      + value           = (known after apply)
      + zone_id         = "cee2af2644f6a3325416173e2d4b44f7"
    }

  # cloudflare_record.aaaa will be created
  + resource "cloudflare_record" "aaaa" {
      + allow_overwrite = false
      + content         = "2a01:4f8:c2c:1ff1::1"
      + created_on      = (known after apply)
      + hostname        = (known after apply)
      + id              = (known after apply)
      + metadata        = (known after apply)
      + modified_on     = (known after apply)
      + name            = "pascal.build"
      + proxiable       = (known after apply)
      + ttl             = 300
      + type            = "AAAA"
      + value           = (known after apply)
      + zone_id         = "cee2af2644f6a3325416173e2d4b44f7"
    }

  # cloudflare_record.aliases["auth"] will be created
  + resource "cloudflare_record" "aliases" {
      + allow_overwrite = false
      + content         = "pascal.build"
      + created_on      = (known after apply)
      + hostname        = (known after apply)
      + id              = (known after apply)
      + metadata        = (known after apply)
      + modified_on     = (known after apply)
      + name            = "auth"
      + proxiable       = (known after apply)
      + ttl             = 300
      + type            = "CNAME"
      + value           = (known after apply)
      + zone_id         = "cee2af2644f6a3325416173e2d4b44f7"
    }

  # cloudflare_record.aliases["grafana"] will be created
  + resource "cloudflare_record" "aliases" {
      + allow_overwrite = false
      + content         = "pascal.build"
      + created_on      = (known after apply)
      + hostname        = (known after apply)
      + id              = (known after apply)
      + metadata        = (known after apply)
      + modified_on     = (known after apply)
      + name            = "grafana"
      + proxiable       = (known after apply)
      + ttl             = 300
      + type            = "CNAME"
      + value           = (known after apply)
      + zone_id         = "cee2af2644f6a3325416173e2d4b44f7"
    }

  # cloudflare_record.aliases["grocy"] will be created
  + resource "cloudflare_record" "aliases" {
      + allow_overwrite = false
      + content         = "pascal.build"
      + created_on      = (known after apply)
      + hostname        = (known after apply)
      + id              = (known after apply)
      + metadata        = (known after apply)
      + modified_on     = (known after apply)
      + name            = "grocy"
      + proxiable       = (known after apply)
      + ttl             = 300
      + type            = "CNAME"
      + value           = (known after apply)
      + zone_id         = "cee2af2644f6a3325416173e2d4b44f7"
    }

  # cloudflare_record.aliases["ldap"] will be created
  + resource "cloudflare_record" "aliases" {
      + allow_overwrite = false
      + content         = "pascal.build"
      + created_on      = (known after apply)
      + hostname        = (known after apply)
      + id              = (known after apply)
      + metadata        = (known after apply)
      + modified_on     = (known after apply)
      + name            = "ldap"
      + proxiable       = (known after apply)
      + ttl             = 300
      + type            = "CNAME"
      + value           = (known after apply)
      + zone_id         = "cee2af2644f6a3325416173e2d4b44f7"
    }

  # cloudflare_record.aliases["photoprism"] will be created
  + resource "cloudflare_record" "aliases" {
      + allow_overwrite = false
      + content         = "pascal.build"
      + created_on      = (known after apply)
      + hostname        = (known after apply)
      + id              = (known after apply)
      + metadata        = (known after apply)
      + modified_on     = (known after apply)
      + name            = "photoprism"
      + proxiable       = (known after apply)
      + ttl             = 300
      + type            = "CNAME"
      + value           = (known after apply)
      + zone_id         = "cee2af2644f6a3325416173e2d4b44f7"
    }

  # cloudflare_record.aliases["traefik"] will be created
  + resource "cloudflare_record" "aliases" {
      + allow_overwrite = false
      + content         = "pascal.build"
      + created_on      = (known after apply)
      + hostname        = (known after apply)
      + id              = (known after apply)
      + metadata        = (known after apply)
      + modified_on     = (known after apply)
      + name            = "traefik"
      + proxiable       = (known after apply)
      + ttl             = 300
      + type            = "CNAME"
      + value           = (known after apply)
      + zone_id         = "cee2af2644f6a3325416173e2d4b44f7"
    }

Plan: 8 to add, 0 to change, 0 to destroy.

─────────────────────────────────────────────────────────────────────────────

Note: You didn't use the -out option to save this plan, so Terraform can't
guarantee to take exactly these actions if you run "terraform apply" now.

Pushed by: @renovate[bot], Action: pull_request

@renovate renovate bot force-pushed the renovate/otel-opentelemetry-collector-contrib-0.x branch from e8885de to fac8a22 Compare January 6, 2026 18:28
@renovate renovate bot changed the title chore(deps): update otel/opentelemetry-collector-contrib docker tag to v0.142.0 chore(deps): update otel/opentelemetry-collector-contrib docker tag to v0.143.0 Jan 6, 2026
@github-actions
Copy link

github-actions bot commented Jan 6, 2026

Terraform Format and Style 🖌success

Terraform Initialization ⚙️success

Terraform Validation 🤖success

Terraform Plan 📖success

Show Plan

terraform
Running plan in HCP Terraform. Output will stream here. Pressing Ctrl-C
will stop streaming the logs, but will not stop the plan running remotely.

Preparing the remote plan...

The remote workspace is configured to work with configuration at
infra relative to the target repository.

Terraform will upload the contents of the following directory,
excluding files or directories as defined by a .terraformignore file
at /home/runner/work/private_server/private_server/.terraformignore (if it is present),
in order to capture the filesystem context the remote workspace expects:
    /home/runner/work/private_server/private_server

To view this run in a browser, visit:
https://app.terraform.io/app/redline/private_server/runs/run-LSE8XMZpxmFjcH8T

Waiting for the plan to start...

Terraform v1.3.2
on linux_amd64
Initializing plugins and modules...
cloudflare_zone.personal_domain: Refreshing state... [id=cee2af2644f6a3325416173e2d4b44f7]
hcloud_ssh_key.ansible: Refreshing state... [id=8957821]
hcloud_firewall.web_firewall: Refreshing state... [id=603891]
cloudflare_record.aliases["grocy"]: Refreshing state... [id=1a98a4348007c72461ab6752f2c7f9df]
cloudflare_record.aliases["grafana"]: Refreshing state... [id=a63efd438a1e819f0e4215e4835a0f24]
cloudflare_record.aliases["auth"]: Refreshing state... [id=59a6c353a0138b64113ad34f046c17dc]
cloudflare_record.aliases["photoprism"]: Refreshing state... [id=6c61639959eeaf8d547dd411419bcf9a]
cloudflare_record.aliases["ldap"]: Refreshing state... [id=416e67a40f89597f342029d943e253ed]
cloudflare_record.aliases["traefik"]: Refreshing state... [id=efbdd0b7c842cec43a43af72a450fcc0]
hcloud_server.web: Refreshing state... [id=51760523]
hcloud_firewall_attachment.firewall_assignments: Refreshing state... [id=603891]
hcloud_volume.data: Refreshing state... [id=24743811]
cloudflare_record.a: Refreshing state... [id=a44b3519c0443db244e9f2dc5bba8a91]
cloudflare_record.aaaa: Refreshing state... [id=1f54f8a3794295291a1b5a18ed363416]
cloudflare_record.a: Drift detected (delete)
hcloud_server.web: Drift detected (update)
hcloud_firewall.web_firewall: Drift detected (update)
cloudflare_record.aaaa: Drift detected (delete)
cloudflare_record.aliases["auth"]: Drift detected (delete)
cloudflare_record.aliases["grafana"]: Drift detected (delete)
cloudflare_record.aliases["grocy"]: Drift detected (delete)
cloudflare_record.aliases["ldap"]: Drift detected (delete)
cloudflare_record.aliases["photoprism"]: Drift detected (delete)
cloudflare_record.aliases["traefik"]: Drift detected (delete)

Terraform used the selected providers to generate the following execution
plan. Resource actions are indicated with the following symbols:
  + create

Terraform will perform the following actions:

  # cloudflare_record.a will be created
  + resource "cloudflare_record" "a" {
      + allow_overwrite = false
      + content         = "78.47.192.97"
      + created_on      = (known after apply)
      + hostname        = (known after apply)
      + id              = (known after apply)
      + metadata        = (known after apply)
      + modified_on     = (known after apply)
      + name            = "pascal.build"
      + proxiable       = (known after apply)
      + ttl             = 300
      + type            = "A"
      + value           = (known after apply)
      + zone_id         = "cee2af2644f6a3325416173e2d4b44f7"
    }

  # cloudflare_record.aaaa will be created
  + resource "cloudflare_record" "aaaa" {
      + allow_overwrite = false
      + content         = "2a01:4f8:c2c:1ff1::1"
      + created_on      = (known after apply)
      + hostname        = (known after apply)
      + id              = (known after apply)
      + metadata        = (known after apply)
      + modified_on     = (known after apply)
      + name            = "pascal.build"
      + proxiable       = (known after apply)
      + ttl             = 300
      + type            = "AAAA"
      + value           = (known after apply)
      + zone_id         = "cee2af2644f6a3325416173e2d4b44f7"
    }

  # cloudflare_record.aliases["auth"] will be created
  + resource "cloudflare_record" "aliases" {
      + allow_overwrite = false
      + content         = "pascal.build"
      + created_on      = (known after apply)
      + hostname        = (known after apply)
      + id              = (known after apply)
      + metadata        = (known after apply)
      + modified_on     = (known after apply)
      + name            = "auth"
      + proxiable       = (known after apply)
      + ttl             = 300
      + type            = "CNAME"
      + value           = (known after apply)
      + zone_id         = "cee2af2644f6a3325416173e2d4b44f7"
    }

  # cloudflare_record.aliases["grafana"] will be created
  + resource "cloudflare_record" "aliases" {
      + allow_overwrite = false
      + content         = "pascal.build"
      + created_on      = (known after apply)
      + hostname        = (known after apply)
      + id              = (known after apply)
      + metadata        = (known after apply)
      + modified_on     = (known after apply)
      + name            = "grafana"
      + proxiable       = (known after apply)
      + ttl             = 300
      + type            = "CNAME"
      + value           = (known after apply)
      + zone_id         = "cee2af2644f6a3325416173e2d4b44f7"
    }

  # cloudflare_record.aliases["grocy"] will be created
  + resource "cloudflare_record" "aliases" {
      + allow_overwrite = false
      + content         = "pascal.build"
      + created_on      = (known after apply)
      + hostname        = (known after apply)
      + id              = (known after apply)
      + metadata        = (known after apply)
      + modified_on     = (known after apply)
      + name            = "grocy"
      + proxiable       = (known after apply)
      + ttl             = 300
      + type            = "CNAME"
      + value           = (known after apply)
      + zone_id         = "cee2af2644f6a3325416173e2d4b44f7"
    }

  # cloudflare_record.aliases["ldap"] will be created
  + resource "cloudflare_record" "aliases" {
      + allow_overwrite = false
      + content         = "pascal.build"
      + created_on      = (known after apply)
      + hostname        = (known after apply)
      + id              = (known after apply)
      + metadata        = (known after apply)
      + modified_on     = (known after apply)
      + name            = "ldap"
      + proxiable       = (known after apply)
      + ttl             = 300
      + type            = "CNAME"
      + value           = (known after apply)
      + zone_id         = "cee2af2644f6a3325416173e2d4b44f7"
    }

  # cloudflare_record.aliases["photoprism"] will be created
  + resource "cloudflare_record" "aliases" {
      + allow_overwrite = false
      + content         = "pascal.build"
      + created_on      = (known after apply)
      + hostname        = (known after apply)
      + id              = (known after apply)
      + metadata        = (known after apply)
      + modified_on     = (known after apply)
      + name            = "photoprism"
      + proxiable       = (known after apply)
      + ttl             = 300
      + type            = "CNAME"
      + value           = (known after apply)
      + zone_id         = "cee2af2644f6a3325416173e2d4b44f7"
    }

  # cloudflare_record.aliases["traefik"] will be created
  + resource "cloudflare_record" "aliases" {
      + allow_overwrite = false
      + content         = "pascal.build"
      + created_on      = (known after apply)
      + hostname        = (known after apply)
      + id              = (known after apply)
      + metadata        = (known after apply)
      + modified_on     = (known after apply)
      + name            = "traefik"
      + proxiable       = (known after apply)
      + ttl             = 300
      + type            = "CNAME"
      + value           = (known after apply)
      + zone_id         = "cee2af2644f6a3325416173e2d4b44f7"
    }

Plan: 8 to add, 0 to change, 0 to destroy.

─────────────────────────────────────────────────────────────────────────────

Note: You didn't use the -out option to save this plan, so Terraform can't
guarantee to take exactly these actions if you run "terraform apply" now.

Pushed by: @renovate[bot], Action: pull_request

@renovate renovate bot force-pushed the renovate/otel-opentelemetry-collector-contrib-0.x branch from fac8a22 to bf48611 Compare January 6, 2026 21:43
@renovate renovate bot changed the title chore(deps): update otel/opentelemetry-collector-contrib docker tag to v0.143.0 chore(deps): update otel/opentelemetry-collector-contrib docker tag to v0.143.1 Jan 6, 2026
@github-actions
Copy link

github-actions bot commented Jan 6, 2026

Terraform Format and Style 🖌success

Terraform Initialization ⚙️success

Terraform Validation 🤖success

Terraform Plan 📖success

Show Plan

terraform
Running plan in HCP Terraform. Output will stream here. Pressing Ctrl-C
will stop streaming the logs, but will not stop the plan running remotely.

Preparing the remote plan...

The remote workspace is configured to work with configuration at
infra relative to the target repository.

Terraform will upload the contents of the following directory,
excluding files or directories as defined by a .terraformignore file
at /home/runner/work/private_server/private_server/.terraformignore (if it is present),
in order to capture the filesystem context the remote workspace expects:
    /home/runner/work/private_server/private_server

To view this run in a browser, visit:
https://app.terraform.io/app/redline/private_server/runs/run-dM1vkqMvzGXkpcT5

Waiting for the plan to start...

Terraform v1.3.2
on linux_amd64
Initializing plugins and modules...
cloudflare_zone.personal_domain: Refreshing state... [id=cee2af2644f6a3325416173e2d4b44f7]
hcloud_ssh_key.ansible: Refreshing state... [id=8957821]
hcloud_firewall.web_firewall: Refreshing state... [id=603891]
hcloud_server.web: Refreshing state... [id=51760523]
cloudflare_record.aliases["traefik"]: Refreshing state... [id=efbdd0b7c842cec43a43af72a450fcc0]
cloudflare_record.aliases["grafana"]: Refreshing state... [id=a63efd438a1e819f0e4215e4835a0f24]
cloudflare_record.aliases["grocy"]: Refreshing state... [id=1a98a4348007c72461ab6752f2c7f9df]
cloudflare_record.aliases["auth"]: Refreshing state... [id=59a6c353a0138b64113ad34f046c17dc]
cloudflare_record.aliases["ldap"]: Refreshing state... [id=416e67a40f89597f342029d943e253ed]
cloudflare_record.aliases["photoprism"]: Refreshing state... [id=6c61639959eeaf8d547dd411419bcf9a]
hcloud_firewall_attachment.firewall_assignments: Refreshing state... [id=603891]
hcloud_volume.data: Refreshing state... [id=24743811]
cloudflare_record.aaaa: Refreshing state... [id=1f54f8a3794295291a1b5a18ed363416]
cloudflare_record.a: Refreshing state... [id=a44b3519c0443db244e9f2dc5bba8a91]
cloudflare_record.aliases["traefik"]: Drift detected (delete)
cloudflare_record.aliases["auth"]: Drift detected (delete)
cloudflare_record.aliases["grafana"]: Drift detected (delete)
cloudflare_record.aliases["grocy"]: Drift detected (delete)
cloudflare_record.aliases["ldap"]: Drift detected (delete)
cloudflare_record.aliases["photoprism"]: Drift detected (delete)
cloudflare_record.a: Drift detected (delete)
hcloud_server.web: Drift detected (update)
hcloud_firewall.web_firewall: Drift detected (update)
cloudflare_record.aaaa: Drift detected (delete)

Terraform used the selected providers to generate the following execution
plan. Resource actions are indicated with the following symbols:
  + create

Terraform will perform the following actions:

  # cloudflare_record.a will be created
  + resource "cloudflare_record" "a" {
      + allow_overwrite = false
      + content         = "78.47.192.97"
      + created_on      = (known after apply)
      + hostname        = (known after apply)
      + id              = (known after apply)
      + metadata        = (known after apply)
      + modified_on     = (known after apply)
      + name            = "pascal.build"
      + proxiable       = (known after apply)
      + ttl             = 300
      + type            = "A"
      + value           = (known after apply)
      + zone_id         = "cee2af2644f6a3325416173e2d4b44f7"
    }

  # cloudflare_record.aaaa will be created
  + resource "cloudflare_record" "aaaa" {
      + allow_overwrite = false
      + content         = "2a01:4f8:c2c:1ff1::1"
      + created_on      = (known after apply)
      + hostname        = (known after apply)
      + id              = (known after apply)
      + metadata        = (known after apply)
      + modified_on     = (known after apply)
      + name            = "pascal.build"
      + proxiable       = (known after apply)
      + ttl             = 300
      + type            = "AAAA"
      + value           = (known after apply)
      + zone_id         = "cee2af2644f6a3325416173e2d4b44f7"
    }

  # cloudflare_record.aliases["auth"] will be created
  + resource "cloudflare_record" "aliases" {
      + allow_overwrite = false
      + content         = "pascal.build"
      + created_on      = (known after apply)
      + hostname        = (known after apply)
      + id              = (known after apply)
      + metadata        = (known after apply)
      + modified_on     = (known after apply)
      + name            = "auth"
      + proxiable       = (known after apply)
      + ttl             = 300
      + type            = "CNAME"
      + value           = (known after apply)
      + zone_id         = "cee2af2644f6a3325416173e2d4b44f7"
    }

  # cloudflare_record.aliases["grafana"] will be created
  + resource "cloudflare_record" "aliases" {
      + allow_overwrite = false
      + content         = "pascal.build"
      + created_on      = (known after apply)
      + hostname        = (known after apply)
      + id              = (known after apply)
      + metadata        = (known after apply)
      + modified_on     = (known after apply)
      + name            = "grafana"
      + proxiable       = (known after apply)
      + ttl             = 300
      + type            = "CNAME"
      + value           = (known after apply)
      + zone_id         = "cee2af2644f6a3325416173e2d4b44f7"
    }

  # cloudflare_record.aliases["grocy"] will be created
  + resource "cloudflare_record" "aliases" {
      + allow_overwrite = false
      + content         = "pascal.build"
      + created_on      = (known after apply)
      + hostname        = (known after apply)
      + id              = (known after apply)
      + metadata        = (known after apply)
      + modified_on     = (known after apply)
      + name            = "grocy"
      + proxiable       = (known after apply)
      + ttl             = 300
      + type            = "CNAME"
      + value           = (known after apply)
      + zone_id         = "cee2af2644f6a3325416173e2d4b44f7"
    }

  # cloudflare_record.aliases["ldap"] will be created
  + resource "cloudflare_record" "aliases" {
      + allow_overwrite = false
      + content         = "pascal.build"
      + created_on      = (known after apply)
      + hostname        = (known after apply)
      + id              = (known after apply)
      + metadata        = (known after apply)
      + modified_on     = (known after apply)
      + name            = "ldap"
      + proxiable       = (known after apply)
      + ttl             = 300
      + type            = "CNAME"
      + value           = (known after apply)
      + zone_id         = "cee2af2644f6a3325416173e2d4b44f7"
    }

  # cloudflare_record.aliases["photoprism"] will be created
  + resource "cloudflare_record" "aliases" {
      + allow_overwrite = false
      + content         = "pascal.build"
      + created_on      = (known after apply)
      + hostname        = (known after apply)
      + id              = (known after apply)
      + metadata        = (known after apply)
      + modified_on     = (known after apply)
      + name            = "photoprism"
      + proxiable       = (known after apply)
      + ttl             = 300
      + type            = "CNAME"
      + value           = (known after apply)
      + zone_id         = "cee2af2644f6a3325416173e2d4b44f7"
    }

  # cloudflare_record.aliases["traefik"] will be created
  + resource "cloudflare_record" "aliases" {
      + allow_overwrite = false
      + content         = "pascal.build"
      + created_on      = (known after apply)
      + hostname        = (known after apply)
      + id              = (known after apply)
      + metadata        = (known after apply)
      + modified_on     = (known after apply)
      + name            = "traefik"
      + proxiable       = (known after apply)
      + ttl             = 300
      + type            = "CNAME"
      + value           = (known after apply)
      + zone_id         = "cee2af2644f6a3325416173e2d4b44f7"
    }

Plan: 8 to add, 0 to change, 0 to destroy.

─────────────────────────────────────────────────────────────────────────────

Note: You didn't use the -out option to save this plan, so Terraform can't
guarantee to take exactly these actions if you run "terraform apply" now.

Pushed by: @renovate[bot], Action: pull_request

@renovate renovate bot force-pushed the renovate/otel-opentelemetry-collector-contrib-0.x branch from bf48611 to 5ba776d Compare January 20, 2026 17:43
@renovate renovate bot changed the title chore(deps): update otel/opentelemetry-collector-contrib docker tag to v0.143.1 chore(deps): update otel/opentelemetry-collector-contrib docker tag to v0.144.0 Jan 20, 2026
@github-actions
Copy link

Terraform Format and Style 🖌success

Terraform Initialization ⚙️success

Terraform Validation 🤖success

Terraform Plan 📖success

Show Plan

terraform
Running plan in HCP Terraform. Output will stream here. Pressing Ctrl-C
will stop streaming the logs, but will not stop the plan running remotely.

Preparing the remote plan...

The remote workspace is configured to work with configuration at
infra relative to the target repository.

Terraform will upload the contents of the following directory,
excluding files or directories as defined by a .terraformignore file
at /home/runner/work/private_server/private_server/.terraformignore (if it is present),
in order to capture the filesystem context the remote workspace expects:
    /home/runner/work/private_server/private_server

To view this run in a browser, visit:
https://app.terraform.io/app/redline/private_server/runs/run-m9DwCs7Cywqrx5BG

Waiting for the plan to start...

Terraform v1.3.2
on linux_amd64
Initializing plugins and modules...
hcloud_ssh_key.ansible: Refreshing state... [id=8957821]
hcloud_firewall.web_firewall: Refreshing state... [id=603891]
cloudflare_zone.personal_domain: Refreshing state... [id=cee2af2644f6a3325416173e2d4b44f7]
cloudflare_record.aliases["photoprism"]: Refreshing state... [id=6c61639959eeaf8d547dd411419bcf9a]
cloudflare_record.aliases["grafana"]: Refreshing state... [id=a63efd438a1e819f0e4215e4835a0f24]
cloudflare_record.aliases["traefik"]: Refreshing state... [id=efbdd0b7c842cec43a43af72a450fcc0]
cloudflare_record.aliases["grocy"]: Refreshing state... [id=1a98a4348007c72461ab6752f2c7f9df]
cloudflare_record.aliases["auth"]: Refreshing state... [id=59a6c353a0138b64113ad34f046c17dc]
cloudflare_record.aliases["ldap"]: Refreshing state... [id=416e67a40f89597f342029d943e253ed]
hcloud_server.web: Refreshing state... [id=51760523]
hcloud_firewall_attachment.firewall_assignments: Refreshing state... [id=603891]
hcloud_volume.data: Refreshing state... [id=24743811]
cloudflare_record.aaaa: Refreshing state... [id=1f54f8a3794295291a1b5a18ed363416]
cloudflare_record.a: Refreshing state... [id=a44b3519c0443db244e9f2dc5bba8a91]
cloudflare_record.a: Drift detected (delete)
cloudflare_record.aaaa: Drift detected (delete)
hcloud_server.web: Drift detected (update)
cloudflare_record.aliases["traefik"]: Drift detected (delete)
cloudflare_record.aliases["auth"]: Drift detected (delete)
cloudflare_record.aliases["grafana"]: Drift detected (delete)
cloudflare_record.aliases["grocy"]: Drift detected (delete)
cloudflare_record.aliases["ldap"]: Drift detected (delete)
cloudflare_record.aliases["photoprism"]: Drift detected (delete)
hcloud_firewall.web_firewall: Drift detected (update)

Terraform used the selected providers to generate the following execution
plan. Resource actions are indicated with the following symbols:
  + create

Terraform will perform the following actions:

  # cloudflare_record.a will be created
  + resource "cloudflare_record" "a" {
      + allow_overwrite = false
      + content         = "78.47.192.97"
      + created_on      = (known after apply)
      + hostname        = (known after apply)
      + id              = (known after apply)
      + metadata        = (known after apply)
      + modified_on     = (known after apply)
      + name            = "pascal.build"
      + proxiable       = (known after apply)
      + ttl             = 300
      + type            = "A"
      + value           = (known after apply)
      + zone_id         = "cee2af2644f6a3325416173e2d4b44f7"
    }

  # cloudflare_record.aaaa will be created
  + resource "cloudflare_record" "aaaa" {
      + allow_overwrite = false
      + content         = "2a01:4f8:c2c:1ff1::1"
      + created_on      = (known after apply)
      + hostname        = (known after apply)
      + id              = (known after apply)
      + metadata        = (known after apply)
      + modified_on     = (known after apply)
      + name            = "pascal.build"
      + proxiable       = (known after apply)
      + ttl             = 300
      + type            = "AAAA"
      + value           = (known after apply)
      + zone_id         = "cee2af2644f6a3325416173e2d4b44f7"
    }

  # cloudflare_record.aliases["auth"] will be created
  + resource "cloudflare_record" "aliases" {
      + allow_overwrite = false
      + content         = "pascal.build"
      + created_on      = (known after apply)
      + hostname        = (known after apply)
      + id              = (known after apply)
      + metadata        = (known after apply)
      + modified_on     = (known after apply)
      + name            = "auth"
      + proxiable       = (known after apply)
      + ttl             = 300
      + type            = "CNAME"
      + value           = (known after apply)
      + zone_id         = "cee2af2644f6a3325416173e2d4b44f7"
    }

  # cloudflare_record.aliases["grafana"] will be created
  + resource "cloudflare_record" "aliases" {
      + allow_overwrite = false
      + content         = "pascal.build"
      + created_on      = (known after apply)
      + hostname        = (known after apply)
      + id              = (known after apply)
      + metadata        = (known after apply)
      + modified_on     = (known after apply)
      + name            = "grafana"
      + proxiable       = (known after apply)
      + ttl             = 300
      + type            = "CNAME"
      + value           = (known after apply)
      + zone_id         = "cee2af2644f6a3325416173e2d4b44f7"
    }

  # cloudflare_record.aliases["grocy"] will be created
  + resource "cloudflare_record" "aliases" {
      + allow_overwrite = false
      + content         = "pascal.build"
      + created_on      = (known after apply)
      + hostname        = (known after apply)
      + id              = (known after apply)
      + metadata        = (known after apply)
      + modified_on     = (known after apply)
      + name            = "grocy"
      + proxiable       = (known after apply)
      + ttl             = 300
      + type            = "CNAME"
      + value           = (known after apply)
      + zone_id         = "cee2af2644f6a3325416173e2d4b44f7"
    }

  # cloudflare_record.aliases["ldap"] will be created
  + resource "cloudflare_record" "aliases" {
      + allow_overwrite = false
      + content         = "pascal.build"
      + created_on      = (known after apply)
      + hostname        = (known after apply)
      + id              = (known after apply)
      + metadata        = (known after apply)
      + modified_on     = (known after apply)
      + name            = "ldap"
      + proxiable       = (known after apply)
      + ttl             = 300
      + type            = "CNAME"
      + value           = (known after apply)
      + zone_id         = "cee2af2644f6a3325416173e2d4b44f7"
    }

  # cloudflare_record.aliases["photoprism"] will be created
  + resource "cloudflare_record" "aliases" {
      + allow_overwrite = false
      + content         = "pascal.build"
      + created_on      = (known after apply)
      + hostname        = (known after apply)
      + id              = (known after apply)
      + metadata        = (known after apply)
      + modified_on     = (known after apply)
      + name            = "photoprism"
      + proxiable       = (known after apply)
      + ttl             = 300
      + type            = "CNAME"
      + value           = (known after apply)
      + zone_id         = "cee2af2644f6a3325416173e2d4b44f7"
    }

  # cloudflare_record.aliases["traefik"] will be created
  + resource "cloudflare_record" "aliases" {
      + allow_overwrite = false
      + content         = "pascal.build"
      + created_on      = (known after apply)
      + hostname        = (known after apply)
      + id              = (known after apply)
      + metadata        = (known after apply)
      + modified_on     = (known after apply)
      + name            = "traefik"
      + proxiable       = (known after apply)
      + ttl             = 300
      + type            = "CNAME"
      + value           = (known after apply)
      + zone_id         = "cee2af2644f6a3325416173e2d4b44f7"
    }

Plan: 8 to add, 0 to change, 0 to destroy.

─────────────────────────────────────────────────────────────────────────────

Note: You didn't use the -out option to save this plan, so Terraform can't
guarantee to take exactly these actions if you run "terraform apply" now.

Pushed by: @renovate[bot], Action: pull_request

@renovate renovate bot force-pushed the renovate/otel-opentelemetry-collector-contrib-0.x branch from 5ba776d to f37a2b3 Compare February 5, 2026 10:13
@renovate renovate bot changed the title chore(deps): update otel/opentelemetry-collector-contrib docker tag to v0.144.0 chore(deps): update otel/opentelemetry-collector-contrib docker tag to v0.145.0 Feb 5, 2026
@github-actions
Copy link

github-actions bot commented Feb 5, 2026

Terraform Format and Style 🖌success

Terraform Initialization ⚙️success

Terraform Validation 🤖success

Terraform Plan 📖success

Show Plan

terraform
Running plan in HCP Terraform. Output will stream here. Pressing Ctrl-C
will stop streaming the logs, but will not stop the plan running remotely.

Preparing the remote plan...

The remote workspace is configured to work with configuration at
infra relative to the target repository.

Terraform will upload the contents of the following directory,
excluding files or directories as defined by a .terraformignore file
at /home/runner/work/private_server/private_server/.terraformignore (if it is present),
in order to capture the filesystem context the remote workspace expects:
    /home/runner/work/private_server/private_server

To view this run in a browser, visit:
https://app.terraform.io/app/redline/private_server/runs/run-bmTbjEUkhBV4nMiX

Waiting for the plan to start...

Terraform v1.3.2
on linux_amd64
Initializing plugins and modules...
cloudflare_zone.personal_domain: Refreshing state... [id=cee2af2644f6a3325416173e2d4b44f7]
hcloud_ssh_key.ansible: Refreshing state... [id=8957821]
hcloud_firewall.web_firewall: Refreshing state... [id=603891]
cloudflare_record.aliases["auth"]: Refreshing state... [id=59a6c353a0138b64113ad34f046c17dc]
cloudflare_record.aliases["photoprism"]: Refreshing state... [id=6c61639959eeaf8d547dd411419bcf9a]
cloudflare_record.aliases["ldap"]: Refreshing state... [id=416e67a40f89597f342029d943e253ed]
cloudflare_record.aliases["traefik"]: Refreshing state... [id=efbdd0b7c842cec43a43af72a450fcc0]
cloudflare_record.aliases["grafana"]: Refreshing state... [id=a63efd438a1e819f0e4215e4835a0f24]
cloudflare_record.aliases["grocy"]: Refreshing state... [id=1a98a4348007c72461ab6752f2c7f9df]
hcloud_server.web: Refreshing state... [id=51760523]
hcloud_volume.data: Refreshing state... [id=24743811]
hcloud_firewall_attachment.firewall_assignments: Refreshing state... [id=603891]
cloudflare_record.a: Refreshing state... [id=a44b3519c0443db244e9f2dc5bba8a91]
cloudflare_record.aaaa: Refreshing state... [id=1f54f8a3794295291a1b5a18ed363416]
cloudflare_record.a: Drift detected (delete)
cloudflare_record.aliases["ldap"]: Drift detected (delete)
cloudflare_record.aliases["photoprism"]: Drift detected (delete)
cloudflare_record.aliases["traefik"]: Drift detected (delete)
cloudflare_record.aliases["auth"]: Drift detected (delete)
cloudflare_record.aliases["grafana"]: Drift detected (delete)
cloudflare_record.aliases["grocy"]: Drift detected (delete)
cloudflare_record.aaaa: Drift detected (delete)
hcloud_server.web: Drift detected (update)
hcloud_firewall.web_firewall: Drift detected (update)

Terraform used the selected providers to generate the following execution
plan. Resource actions are indicated with the following symbols:
  + create

Terraform will perform the following actions:

  # cloudflare_record.a will be created
  + resource "cloudflare_record" "a" {
      + allow_overwrite = false
      + content         = "78.47.192.97"
      + created_on      = (known after apply)
      + hostname        = (known after apply)
      + id              = (known after apply)
      + metadata        = (known after apply)
      + modified_on     = (known after apply)
      + name            = "pascal.build"
      + proxiable       = (known after apply)
      + ttl             = 300
      + type            = "A"
      + value           = (known after apply)
      + zone_id         = "cee2af2644f6a3325416173e2d4b44f7"
    }

  # cloudflare_record.aaaa will be created
  + resource "cloudflare_record" "aaaa" {
      + allow_overwrite = false
      + content         = "2a01:4f8:c2c:1ff1::1"
      + created_on      = (known after apply)
      + hostname        = (known after apply)
      + id              = (known after apply)
      + metadata        = (known after apply)
      + modified_on     = (known after apply)
      + name            = "pascal.build"
      + proxiable       = (known after apply)
      + ttl             = 300
      + type            = "AAAA"
      + value           = (known after apply)
      + zone_id         = "cee2af2644f6a3325416173e2d4b44f7"
    }

  # cloudflare_record.aliases["auth"] will be created
  + resource "cloudflare_record" "aliases" {
      + allow_overwrite = false
      + content         = "pascal.build"
      + created_on      = (known after apply)
      + hostname        = (known after apply)
      + id              = (known after apply)
      + metadata        = (known after apply)
      + modified_on     = (known after apply)
      + name            = "auth"
      + proxiable       = (known after apply)
      + ttl             = 300
      + type            = "CNAME"
      + value           = (known after apply)
      + zone_id         = "cee2af2644f6a3325416173e2d4b44f7"
    }

  # cloudflare_record.aliases["grafana"] will be created
  + resource "cloudflare_record" "aliases" {
      + allow_overwrite = false
      + content         = "pascal.build"
      + created_on      = (known after apply)
      + hostname        = (known after apply)
      + id              = (known after apply)
      + metadata        = (known after apply)
      + modified_on     = (known after apply)
      + name            = "grafana"
      + proxiable       = (known after apply)
      + ttl             = 300
      + type            = "CNAME"
      + value           = (known after apply)
      + zone_id         = "cee2af2644f6a3325416173e2d4b44f7"
    }

  # cloudflare_record.aliases["grocy"] will be created
  + resource "cloudflare_record" "aliases" {
      + allow_overwrite = false
      + content         = "pascal.build"
      + created_on      = (known after apply)
      + hostname        = (known after apply)
      + id              = (known after apply)
      + metadata        = (known after apply)
      + modified_on     = (known after apply)
      + name            = "grocy"
      + proxiable       = (known after apply)
      + ttl             = 300
      + type            = "CNAME"
      + value           = (known after apply)
      + zone_id         = "cee2af2644f6a3325416173e2d4b44f7"
    }

  # cloudflare_record.aliases["ldap"] will be created
  + resource "cloudflare_record" "aliases" {
      + allow_overwrite = false
      + content         = "pascal.build"
      + created_on      = (known after apply)
      + hostname        = (known after apply)
      + id              = (known after apply)
      + metadata        = (known after apply)
      + modified_on     = (known after apply)
      + name            = "ldap"
      + proxiable       = (known after apply)
      + ttl             = 300
      + type            = "CNAME"
      + value           = (known after apply)
      + zone_id         = "cee2af2644f6a3325416173e2d4b44f7"
    }

  # cloudflare_record.aliases["photoprism"] will be created
  + resource "cloudflare_record" "aliases" {
      + allow_overwrite = false
      + content         = "pascal.build"
      + created_on      = (known after apply)
      + hostname        = (known after apply)
      + id              = (known after apply)
      + metadata        = (known after apply)
      + modified_on     = (known after apply)
      + name            = "photoprism"
      + proxiable       = (known after apply)
      + ttl             = 300
      + type            = "CNAME"
      + value           = (known after apply)
      + zone_id         = "cee2af2644f6a3325416173e2d4b44f7"
    }

  # cloudflare_record.aliases["traefik"] will be created
  + resource "cloudflare_record" "aliases" {
      + allow_overwrite = false
      + content         = "pascal.build"
      + created_on      = (known after apply)
      + hostname        = (known after apply)
      + id              = (known after apply)
      + metadata        = (known after apply)
      + modified_on     = (known after apply)
      + name            = "traefik"
      + proxiable       = (known after apply)
      + ttl             = 300
      + type            = "CNAME"
      + value           = (known after apply)
      + zone_id         = "cee2af2644f6a3325416173e2d4b44f7"
    }

Plan: 8 to add, 0 to change, 0 to destroy.

─────────────────────────────────────────────────────────────────────────────

Note: You didn't use the -out option to save this plan, so Terraform can't
guarantee to take exactly these actions if you run "terraform apply" now.

Pushed by: @renovate[bot], Action: pull_request

@renovate renovate bot force-pushed the renovate/otel-opentelemetry-collector-contrib-0.x branch from f37a2b3 to 6b3c36d Compare February 18, 2026 21:41
@renovate renovate bot changed the title chore(deps): update otel/opentelemetry-collector-contrib docker tag to v0.145.0 chore(deps): update otel/opentelemetry-collector-contrib docker tag to v0.146.1 Feb 18, 2026
@github-actions
Copy link

Terraform Format and Style 🖌success

Terraform Initialization ⚙️success

Terraform Validation 🤖success

Terraform Plan 📖success

Show Plan

terraform
Running plan in HCP Terraform. Output will stream here. Pressing Ctrl-C
will stop streaming the logs, but will not stop the plan running remotely.

Preparing the remote plan...

The remote workspace is configured to work with configuration at
infra relative to the target repository.

Terraform will upload the contents of the following directory,
excluding files or directories as defined by a .terraformignore file
at /home/runner/work/private_server/private_server/.terraformignore (if it is present),
in order to capture the filesystem context the remote workspace expects:
    /home/runner/work/private_server/private_server

To view this run in a browser, visit:
https://app.terraform.io/app/redline/private_server/runs/run-43MAy97HttGkGtv4

Waiting for the plan to start...

Terraform v1.3.2
on linux_amd64
Initializing plugins and modules...
hcloud_ssh_key.ansible: Refreshing state... [id=8957821]
hcloud_firewall.web_firewall: Refreshing state... [id=603891]
cloudflare_zone.personal_domain: Refreshing state... [id=cee2af2644f6a3325416173e2d4b44f7]
cloudflare_record.aliases["traefik"]: Refreshing state... [id=efbdd0b7c842cec43a43af72a450fcc0]
cloudflare_record.aliases["photoprism"]: Refreshing state... [id=6c61639959eeaf8d547dd411419bcf9a]
cloudflare_record.aliases["grocy"]: Refreshing state... [id=1a98a4348007c72461ab6752f2c7f9df]
cloudflare_record.aliases["ldap"]: Refreshing state... [id=416e67a40f89597f342029d943e253ed]
cloudflare_record.aliases["auth"]: Refreshing state... [id=59a6c353a0138b64113ad34f046c17dc]
cloudflare_record.aliases["grafana"]: Refreshing state... [id=a63efd438a1e819f0e4215e4835a0f24]
hcloud_server.web: Refreshing state... [id=51760523]
hcloud_firewall_attachment.firewall_assignments: Refreshing state... [id=603891]
hcloud_volume.data: Refreshing state... [id=24743811]
cloudflare_record.a: Refreshing state... [id=a44b3519c0443db244e9f2dc5bba8a91]
cloudflare_record.aaaa: Refreshing state... [id=1f54f8a3794295291a1b5a18ed363416]
cloudflare_record.aliases["auth"]: Drift detected (delete)
cloudflare_record.aliases["grafana"]: Drift detected (delete)
cloudflare_record.aliases["grocy"]: Drift detected (delete)
cloudflare_record.aliases["ldap"]: Drift detected (delete)
cloudflare_record.aliases["photoprism"]: Drift detected (delete)
cloudflare_record.aliases["traefik"]: Drift detected (delete)
hcloud_server.web: Drift detected (update)
cloudflare_record.aaaa: Drift detected (delete)
cloudflare_record.a: Drift detected (delete)
hcloud_firewall.web_firewall: Drift detected (update)

Terraform used the selected providers to generate the following execution
plan. Resource actions are indicated with the following symbols:
  + create

Terraform will perform the following actions:

  # cloudflare_record.a will be created
  + resource "cloudflare_record" "a" {
      + allow_overwrite = false
      + content         = "78.47.192.97"
      + created_on      = (known after apply)
      + hostname        = (known after apply)
      + id              = (known after apply)
      + metadata        = (known after apply)
      + modified_on     = (known after apply)
      + name            = "pascal.build"
      + proxiable       = (known after apply)
      + ttl             = 300
      + type            = "A"
      + value           = (known after apply)
      + zone_id         = "cee2af2644f6a3325416173e2d4b44f7"
    }

  # cloudflare_record.aaaa will be created
  + resource "cloudflare_record" "aaaa" {
      + allow_overwrite = false
      + content         = "2a01:4f8:c2c:1ff1::1"
      + created_on      = (known after apply)
      + hostname        = (known after apply)
      + id              = (known after apply)
      + metadata        = (known after apply)
      + modified_on     = (known after apply)
      + name            = "pascal.build"
      + proxiable       = (known after apply)
      + ttl             = 300
      + type            = "AAAA"
      + value           = (known after apply)
      + zone_id         = "cee2af2644f6a3325416173e2d4b44f7"
    }

  # cloudflare_record.aliases["auth"] will be created
  + resource "cloudflare_record" "aliases" {
      + allow_overwrite = false
      + content         = "pascal.build"
      + created_on      = (known after apply)
      + hostname        = (known after apply)
      + id              = (known after apply)
      + metadata        = (known after apply)
      + modified_on     = (known after apply)
      + name            = "auth"
      + proxiable       = (known after apply)
      + ttl             = 300
      + type            = "CNAME"
      + value           = (known after apply)
      + zone_id         = "cee2af2644f6a3325416173e2d4b44f7"
    }

  # cloudflare_record.aliases["grafana"] will be created
  + resource "cloudflare_record" "aliases" {
      + allow_overwrite = false
      + content         = "pascal.build"
      + created_on      = (known after apply)
      + hostname        = (known after apply)
      + id              = (known after apply)
      + metadata        = (known after apply)
      + modified_on     = (known after apply)
      + name            = "grafana"
      + proxiable       = (known after apply)
      + ttl             = 300
      + type            = "CNAME"
      + value           = (known after apply)
      + zone_id         = "cee2af2644f6a3325416173e2d4b44f7"
    }

  # cloudflare_record.aliases["grocy"] will be created
  + resource "cloudflare_record" "aliases" {
      + allow_overwrite = false
      + content         = "pascal.build"
      + created_on      = (known after apply)
      + hostname        = (known after apply)
      + id              = (known after apply)
      + metadata        = (known after apply)
      + modified_on     = (known after apply)
      + name            = "grocy"
      + proxiable       = (known after apply)
      + ttl             = 300
      + type            = "CNAME"
      + value           = (known after apply)
      + zone_id         = "cee2af2644f6a3325416173e2d4b44f7"
    }

  # cloudflare_record.aliases["ldap"] will be created
  + resource "cloudflare_record" "aliases" {
      + allow_overwrite = false
      + content         = "pascal.build"
      + created_on      = (known after apply)
      + hostname        = (known after apply)
      + id              = (known after apply)
      + metadata        = (known after apply)
      + modified_on     = (known after apply)
      + name            = "ldap"
      + proxiable       = (known after apply)
      + ttl             = 300
      + type            = "CNAME"
      + value           = (known after apply)
      + zone_id         = "cee2af2644f6a3325416173e2d4b44f7"
    }

  # cloudflare_record.aliases["photoprism"] will be created
  + resource "cloudflare_record" "aliases" {
      + allow_overwrite = false
      + content         = "pascal.build"
      + created_on      = (known after apply)
      + hostname        = (known after apply)
      + id              = (known after apply)
      + metadata        = (known after apply)
      + modified_on     = (known after apply)
      + name            = "photoprism"
      + proxiable       = (known after apply)
      + ttl             = 300
      + type            = "CNAME"
      + value           = (known after apply)
      + zone_id         = "cee2af2644f6a3325416173e2d4b44f7"
    }

  # cloudflare_record.aliases["traefik"] will be created
  + resource "cloudflare_record" "aliases" {
      + allow_overwrite = false
      + content         = "pascal.build"
      + created_on      = (known after apply)
      + hostname        = (known after apply)
      + id              = (known after apply)
      + metadata        = (known after apply)
      + modified_on     = (known after apply)
      + name            = "traefik"
      + proxiable       = (known after apply)
      + ttl             = 300
      + type            = "CNAME"
      + value           = (known after apply)
      + zone_id         = "cee2af2644f6a3325416173e2d4b44f7"
    }

Plan: 8 to add, 0 to change, 0 to destroy.

─────────────────────────────────────────────────────────────────────────────

Note: You didn't use the -out option to save this plan, so Terraform can't
guarantee to take exactly these actions if you run "terraform apply" now.

Pushed by: @renovate[bot], Action: pull_request

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

0 participants