Skip to content

Comments

chore(deps): update grafana/tempo docker tag to v2.10.1#251

Open
renovate[bot] wants to merge 1 commit intomasterfrom
renovate/grafana-tempo-2.x
Open

chore(deps): update grafana/tempo docker tag to v2.10.1#251
renovate[bot] wants to merge 1 commit intomasterfrom
renovate/grafana-tempo-2.x

Conversation

@renovate
Copy link
Contributor

@renovate renovate bot commented Sep 3, 2024

This PR contains the following updates:

Package Update Change
grafana/tempo minor 2.5.02.10.1

Warning

Some dependencies could not be looked up. Check the Dependency Dashboard for more information.


Configuration

📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).

🚦 Automerge: Enabled.

Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

@renovate renovate bot enabled auto-merge (rebase) September 3, 2024 18:23
@github-actions
Copy link

github-actions bot commented Sep 3, 2024

Terraform Format and Style 🖌success

Terraform Initialization ⚙️success

Terraform Validation 🤖success

Terraform Plan 📖success

Show Plan

terraform
Running plan in HCP Terraform. Output will stream here. Pressing Ctrl-C
will stop streaming the logs, but will not stop the plan running remotely.

Preparing the remote plan...

The remote workspace is configured to work with configuration at
infra relative to the target repository.

Terraform will upload the contents of the following directory,
excluding files or directories as defined by a .terraformignore file
at /home/runner/work/private_server/private_server/.terraformignore (if it is present),
in order to capture the filesystem context the remote workspace expects:
    /home/runner/work/private_server/private_server

To view this run in a browser, visit:
https://app.terraform.io/app/redline/private_server/runs/run-WJNo7LKpNXYJxn6b

Waiting for the plan to start...

Terraform v1.3.2
on linux_amd64
Initializing plugins and modules...
cloudflare_zone.personal_domain: Refreshing state... [id=cee2af2644f6a3325416173e2d4b44f7]
hcloud_ssh_key.ansible: Refreshing state... [id=8957821]
hcloud_firewall.web_firewall: Refreshing state... [id=603891]
cloudflare_record.aliases["ldap"]: Refreshing state... [id=416e67a40f89597f342029d943e253ed]
cloudflare_record.aliases["traefik"]: Refreshing state... [id=efbdd0b7c842cec43a43af72a450fcc0]
cloudflare_record.aliases["grocy"]: Refreshing state... [id=1a98a4348007c72461ab6752f2c7f9df]
cloudflare_record.aliases["auth"]: Refreshing state... [id=59a6c353a0138b64113ad34f046c17dc]
cloudflare_record.aliases["grafana"]: Refreshing state... [id=a63efd438a1e819f0e4215e4835a0f24]
cloudflare_record.aliases["photoprism"]: Refreshing state... [id=6c61639959eeaf8d547dd411419bcf9a]
hcloud_server.web: Refreshing state... [id=51760523]
hcloud_firewall_attachment.firewall_assignments: Refreshing state... [id=603891]
hcloud_volume.data: Refreshing state... [id=24743811]
cloudflare_record.a: Refreshing state... [id=a44b3519c0443db244e9f2dc5bba8a91]
cloudflare_record.aaaa: Refreshing state... [id=1f54f8a3794295291a1b5a18ed363416]
hcloud_server.web: Drift detected (update)
hcloud_firewall.web_firewall: Drift detected (update)

No changes. Your infrastructure matches the configuration.

Terraform has compared your real infrastructure against your configuration
and found no differences, so no changes are needed.

─────────────────────────────────────────────────────────────────────────────

Note: You didn't use the -out option to save this plan, so Terraform can't
guarantee to take exactly these actions if you run "terraform apply" now.

Pushed by: @renovate[bot], Action: pull_request

auto-merge was automatically disabled September 3, 2024 18:24

Base branch requires signed commits

@renovate renovate bot force-pushed the renovate/grafana-tempo-2.x branch from 407d600 to 473b353 Compare October 15, 2024 18:46
@renovate renovate bot changed the title chore(deps): update grafana/tempo docker tag to v2.6.0 chore(deps): update grafana/tempo docker tag to v2.6.1 Oct 15, 2024
@github-actions
Copy link

Terraform Format and Style 🖌success

Terraform Initialization ⚙️success

Terraform Validation 🤖success

Terraform Plan 📖success

Show Plan

terraform
Running plan in HCP Terraform. Output will stream here. Pressing Ctrl-C
will stop streaming the logs, but will not stop the plan running remotely.

Preparing the remote plan...

The remote workspace is configured to work with configuration at
infra relative to the target repository.

Terraform will upload the contents of the following directory,
excluding files or directories as defined by a .terraformignore file
at /home/runner/work/private_server/private_server/.terraformignore (if it is present),
in order to capture the filesystem context the remote workspace expects:
    /home/runner/work/private_server/private_server

To view this run in a browser, visit:
https://app.terraform.io/app/redline/private_server/runs/run-qKvvSPcLAxgXZYsT

Waiting for the plan to start...

Terraform v1.3.2
on linux_amd64
Initializing plugins and modules...
cloudflare_zone.personal_domain: Refreshing state... [id=cee2af2644f6a3325416173e2d4b44f7]
hcloud_ssh_key.ansible: Refreshing state... [id=8957821]
hcloud_firewall.web_firewall: Refreshing state... [id=603891]
cloudflare_record.aliases["traefik"]: Refreshing state... [id=efbdd0b7c842cec43a43af72a450fcc0]
cloudflare_record.aliases["photoprism"]: Refreshing state... [id=6c61639959eeaf8d547dd411419bcf9a]
cloudflare_record.aliases["auth"]: Refreshing state... [id=59a6c353a0138b64113ad34f046c17dc]
cloudflare_record.aliases["ldap"]: Refreshing state... [id=416e67a40f89597f342029d943e253ed]
cloudflare_record.aliases["grafana"]: Refreshing state... [id=a63efd438a1e819f0e4215e4835a0f24]
cloudflare_record.aliases["grocy"]: Refreshing state... [id=1a98a4348007c72461ab6752f2c7f9df]
hcloud_server.web: Refreshing state... [id=51760523]
hcloud_firewall_attachment.firewall_assignments: Refreshing state... [id=603891]
hcloud_volume.data: Refreshing state... [id=24743811]
cloudflare_record.aaaa: Refreshing state... [id=1f54f8a3794295291a1b5a18ed363416]
cloudflare_record.a: Refreshing state... [id=a44b3519c0443db244e9f2dc5bba8a91]
hcloud_firewall.web_firewall: Drift detected (update)
hcloud_server.web: Drift detected (update)

No changes. Your infrastructure matches the configuration.

Terraform has compared your real infrastructure against your configuration
and found no differences, so no changes are needed.

─────────────────────────────────────────────────────────────────────────────

Note: You didn't use the -out option to save this plan, so Terraform can't
guarantee to take exactly these actions if you run "terraform apply" now.

Pushed by: @renovate[bot], Action: pull_request

@renovate renovate bot enabled auto-merge (rebase) October 20, 2024 20:20
@renovate renovate bot force-pushed the renovate/grafana-tempo-2.x branch from 473b353 to cbe23ab Compare October 20, 2024 20:20
@github-actions
Copy link

Terraform Format and Style 🖌success

Terraform Initialization ⚙️success

Terraform Validation 🤖success

Terraform Plan 📖success

Show Plan

terraform
Running plan in HCP Terraform. Output will stream here. Pressing Ctrl-C
will stop streaming the logs, but will not stop the plan running remotely.

Preparing the remote plan...

The remote workspace is configured to work with configuration at
infra relative to the target repository.

Terraform will upload the contents of the following directory,
excluding files or directories as defined by a .terraformignore file
at /home/runner/work/private_server/private_server/.terraformignore (if it is present),
in order to capture the filesystem context the remote workspace expects:
    /home/runner/work/private_server/private_server

To view this run in a browser, visit:
https://app.terraform.io/app/redline/private_server/runs/run-WkoYvFeYpAVvTGVU

Waiting for the plan to start...

Terraform v1.3.2
on linux_amd64
Initializing plugins and modules...
cloudflare_zone.personal_domain: Refreshing state... [id=cee2af2644f6a3325416173e2d4b44f7]
hcloud_ssh_key.ansible: Refreshing state... [id=8957821]
hcloud_firewall.web_firewall: Refreshing state... [id=603891]
cloudflare_record.aliases["grafana"]: Refreshing state... [id=a63efd438a1e819f0e4215e4835a0f24]
cloudflare_record.aliases["auth"]: Refreshing state... [id=59a6c353a0138b64113ad34f046c17dc]
cloudflare_record.aliases["ldap"]: Refreshing state... [id=416e67a40f89597f342029d943e253ed]
cloudflare_record.aliases["traefik"]: Refreshing state... [id=efbdd0b7c842cec43a43af72a450fcc0]
cloudflare_record.aliases["photoprism"]: Refreshing state... [id=6c61639959eeaf8d547dd411419bcf9a]
cloudflare_record.aliases["grocy"]: Refreshing state... [id=1a98a4348007c72461ab6752f2c7f9df]
hcloud_server.web: Refreshing state... [id=51760523]
hcloud_firewall_attachment.firewall_assignments: Refreshing state... [id=603891]
hcloud_volume.data: Refreshing state... [id=24743811]
cloudflare_record.aaaa: Refreshing state... [id=1f54f8a3794295291a1b5a18ed363416]
cloudflare_record.a: Refreshing state... [id=a44b3519c0443db244e9f2dc5bba8a91]
hcloud_firewall.web_firewall: Drift detected (update)
hcloud_server.web: Drift detected (update)

No changes. Your infrastructure matches the configuration.

Terraform has compared your real infrastructure against your configuration
and found no differences, so no changes are needed.

─────────────────────────────────────────────────────────────────────────────

Note: You didn't use the -out option to save this plan, so Terraform can't
guarantee to take exactly these actions if you run "terraform apply" now.

Pushed by: @renovate[bot], Action: pull_request

auto-merge was automatically disabled October 20, 2024 20:21

Base branch requires signed commits

@renovate renovate bot force-pushed the renovate/grafana-tempo-2.x branch from cbe23ab to 8690ddd Compare January 14, 2025 17:28
@renovate renovate bot changed the title chore(deps): update grafana/tempo docker tag to v2.6.1 chore(deps): update grafana/tempo docker tag to v2.7.0 Jan 14, 2025
@github-actions
Copy link

Terraform Format and Style 🖌success

Terraform Initialization ⚙️success

Terraform Validation 🤖success

Terraform Plan 📖success

Show Plan

terraform
Running plan in HCP Terraform. Output will stream here. Pressing Ctrl-C
will stop streaming the logs, but will not stop the plan running remotely.

Preparing the remote plan...

The remote workspace is configured to work with configuration at
infra relative to the target repository.

Terraform will upload the contents of the following directory,
excluding files or directories as defined by a .terraformignore file
at /home/runner/work/private_server/private_server/.terraformignore (if it is present),
in order to capture the filesystem context the remote workspace expects:
    /home/runner/work/private_server/private_server

To view this run in a browser, visit:
https://app.terraform.io/app/redline/private_server/runs/run-mKJuFM9ziTbs76JY

Waiting for the plan to start...

Terraform v1.3.2
on linux_amd64
Initializing plugins and modules...
cloudflare_zone.personal_domain: Refreshing state... [id=cee2af2644f6a3325416173e2d4b44f7]
hcloud_ssh_key.ansible: Refreshing state... [id=8957821]
hcloud_firewall.web_firewall: Refreshing state... [id=603891]
cloudflare_record.aliases["photoprism"]: Refreshing state... [id=6c61639959eeaf8d547dd411419bcf9a]
cloudflare_record.aliases["auth"]: Refreshing state... [id=59a6c353a0138b64113ad34f046c17dc]
cloudflare_record.aliases["grocy"]: Refreshing state... [id=1a98a4348007c72461ab6752f2c7f9df]
cloudflare_record.aliases["grafana"]: Refreshing state... [id=a63efd438a1e819f0e4215e4835a0f24]
cloudflare_record.aliases["ldap"]: Refreshing state... [id=416e67a40f89597f342029d943e253ed]
cloudflare_record.aliases["traefik"]: Refreshing state... [id=efbdd0b7c842cec43a43af72a450fcc0]
hcloud_server.web: Refreshing state... [id=51760523]
hcloud_firewall_attachment.firewall_assignments: Refreshing state... [id=603891]
hcloud_volume.data: Refreshing state... [id=24743811]
cloudflare_record.aaaa: Refreshing state... [id=1f54f8a3794295291a1b5a18ed363416]
cloudflare_record.a: Refreshing state... [id=a44b3519c0443db244e9f2dc5bba8a91]
hcloud_firewall.web_firewall: Drift detected (update)
hcloud_server.web: Drift detected (update)

No changes. Your infrastructure matches the configuration.

Terraform has compared your real infrastructure against your configuration
and found no differences, so no changes are needed.

─────────────────────────────────────────────────────────────────────────────

Note: You didn't use the -out option to save this plan, so Terraform can't
guarantee to take exactly these actions if you run "terraform apply" now.

Pushed by: @renovate[bot], Action: pull_request

@renovate renovate bot force-pushed the renovate/grafana-tempo-2.x branch from 8690ddd to 5109fed Compare February 14, 2025 18:42
@renovate renovate bot changed the title chore(deps): update grafana/tempo docker tag to v2.7.0 chore(deps): update grafana/tempo docker tag to v2.7.1 Feb 14, 2025
@github-actions
Copy link

Terraform Format and Style 🖌success

Terraform Initialization ⚙️success

Terraform Validation 🤖success

Terraform Plan 📖success

Show Plan

terraform
Running plan in HCP Terraform. Output will stream here. Pressing Ctrl-C
will stop streaming the logs, but will not stop the plan running remotely.

Preparing the remote plan...

The remote workspace is configured to work with configuration at
infra relative to the target repository.

Terraform will upload the contents of the following directory,
excluding files or directories as defined by a .terraformignore file
at /home/runner/work/private_server/private_server/.terraformignore (if it is present),
in order to capture the filesystem context the remote workspace expects:
    /home/runner/work/private_server/private_server

To view this run in a browser, visit:
https://app.terraform.io/app/redline/private_server/runs/run-RNrPhxJ8nyqtD43n

Waiting for the plan to start...

Terraform v1.3.2
on linux_amd64
Initializing plugins and modules...
hcloud_ssh_key.ansible: Refreshing state... [id=8957821]
hcloud_firewall.web_firewall: Refreshing state... [id=603891]
cloudflare_zone.personal_domain: Refreshing state... [id=cee2af2644f6a3325416173e2d4b44f7]
cloudflare_record.aliases["ldap"]: Refreshing state... [id=416e67a40f89597f342029d943e253ed]
cloudflare_record.aliases["grafana"]: Refreshing state... [id=a63efd438a1e819f0e4215e4835a0f24]
cloudflare_record.aliases["auth"]: Refreshing state... [id=59a6c353a0138b64113ad34f046c17dc]
cloudflare_record.aliases["traefik"]: Refreshing state... [id=efbdd0b7c842cec43a43af72a450fcc0]
cloudflare_record.aliases["photoprism"]: Refreshing state... [id=6c61639959eeaf8d547dd411419bcf9a]
cloudflare_record.aliases["grocy"]: Refreshing state... [id=1a98a4348007c72461ab6752f2c7f9df]
hcloud_server.web: Refreshing state... [id=51760523]
hcloud_firewall_attachment.firewall_assignments: Refreshing state... [id=603891]
hcloud_volume.data: Refreshing state... [id=24743811]
cloudflare_record.a: Refreshing state... [id=a44b3519c0443db244e9f2dc5bba8a91]
cloudflare_record.aaaa: Refreshing state... [id=1f54f8a3794295291a1b5a18ed363416]
cloudflare_record.aliases["auth"]: Drift detected (update)
cloudflare_record.aliases["grafana"]: Drift detected (update)
cloudflare_record.aliases["grocy"]: Drift detected (update)
cloudflare_record.aliases["ldap"]: Drift detected (update)
cloudflare_record.aliases["photoprism"]: Drift detected (update)
cloudflare_record.aliases["traefik"]: Drift detected (update)
cloudflare_record.a: Drift detected (update)
cloudflare_record.aaaa: Drift detected (update)
hcloud_firewall.web_firewall: Drift detected (update)
hcloud_server.web: Drift detected (update)

No changes. Your infrastructure matches the configuration.

Terraform has compared your real infrastructure against your configuration
and found no differences, so no changes are needed.

─────────────────────────────────────────────────────────────────────────────

Note: You didn't use the -out option to save this plan, so Terraform can't
guarantee to take exactly these actions if you run "terraform apply" now.

Pushed by: @renovate[bot], Action: pull_request

@renovate renovate bot force-pushed the renovate/grafana-tempo-2.x branch from 5109fed to 4ac91fc Compare March 25, 2025 21:44
@renovate renovate bot changed the title chore(deps): update grafana/tempo docker tag to v2.7.1 chore(deps): update grafana/tempo docker tag to v2.7.2 Mar 25, 2025
@github-actions
Copy link

Terraform Format and Style 🖌success

Terraform Initialization ⚙️success

Terraform Validation 🤖success

Terraform Plan 📖success

Show Plan

terraform
Running plan in HCP Terraform. Output will stream here. Pressing Ctrl-C
will stop streaming the logs, but will not stop the plan running remotely.

Preparing the remote plan...

The remote workspace is configured to work with configuration at
infra relative to the target repository.

Terraform will upload the contents of the following directory,
excluding files or directories as defined by a .terraformignore file
at /home/runner/work/private_server/private_server/.terraformignore (if it is present),
in order to capture the filesystem context the remote workspace expects:
    /home/runner/work/private_server/private_server

To view this run in a browser, visit:
https://app.terraform.io/app/redline/private_server/runs/run-W6wAWvh8ADnDn2nB

Waiting for the plan to start...

Terraform v1.3.2
on linux_amd64
Initializing plugins and modules...
hcloud_ssh_key.ansible: Refreshing state... [id=8957821]
hcloud_firewall.web_firewall: Refreshing state... [id=603891]
cloudflare_zone.personal_domain: Refreshing state... [id=cee2af2644f6a3325416173e2d4b44f7]
cloudflare_record.aliases["traefik"]: Refreshing state... [id=efbdd0b7c842cec43a43af72a450fcc0]
cloudflare_record.aliases["ldap"]: Refreshing state... [id=416e67a40f89597f342029d943e253ed]
cloudflare_record.aliases["auth"]: Refreshing state... [id=59a6c353a0138b64113ad34f046c17dc]
cloudflare_record.aliases["grafana"]: Refreshing state... [id=a63efd438a1e819f0e4215e4835a0f24]
cloudflare_record.aliases["grocy"]: Refreshing state... [id=1a98a4348007c72461ab6752f2c7f9df]
cloudflare_record.aliases["photoprism"]: Refreshing state... [id=6c61639959eeaf8d547dd411419bcf9a]
hcloud_server.web: Refreshing state... [id=51760523]
hcloud_volume.data: Refreshing state... [id=24743811]
hcloud_firewall_attachment.firewall_assignments: Refreshing state... [id=603891]
cloudflare_record.aaaa: Refreshing state... [id=1f54f8a3794295291a1b5a18ed363416]
cloudflare_record.a: Refreshing state... [id=a44b3519c0443db244e9f2dc5bba8a91]
cloudflare_record.a: Drift detected (update)
hcloud_server.web: Drift detected (update)
cloudflare_record.aaaa: Drift detected (update)
hcloud_firewall.web_firewall: Drift detected (update)
cloudflare_record.aliases["ldap"]: Drift detected (update)
cloudflare_record.aliases["photoprism"]: Drift detected (update)
cloudflare_record.aliases["traefik"]: Drift detected (update)
cloudflare_record.aliases["auth"]: Drift detected (update)
cloudflare_record.aliases["grafana"]: Drift detected (update)
cloudflare_record.aliases["grocy"]: Drift detected (update)

No changes. Your infrastructure matches the configuration.

Terraform has compared your real infrastructure against your configuration
and found no differences, so no changes are needed.

─────────────────────────────────────────────────────────────────────────────

Note: You didn't use the -out option to save this plan, so Terraform can't
guarantee to take exactly these actions if you run "terraform apply" now.

Pushed by: @renovate[bot], Action: pull_request

@renovate renovate bot force-pushed the renovate/grafana-tempo-2.x branch from 4ac91fc to fc2b359 Compare June 10, 2025 19:44
@renovate renovate bot changed the title chore(deps): update grafana/tempo docker tag to v2.7.2 chore(deps): update grafana/tempo docker tag to v2.8.0 Jun 10, 2025
@github-actions
Copy link

Terraform Format and Style 🖌success

Terraform Initialization ⚙️success

Terraform Validation 🤖success

Terraform Plan 📖success

Show Plan

terraform
Running plan in HCP Terraform. Output will stream here. Pressing Ctrl-C
will stop streaming the logs, but will not stop the plan running remotely.

Preparing the remote plan...

The remote workspace is configured to work with configuration at
infra relative to the target repository.

Terraform will upload the contents of the following directory,
excluding files or directories as defined by a .terraformignore file
at /home/runner/work/private_server/private_server/.terraformignore (if it is present),
in order to capture the filesystem context the remote workspace expects:
    /home/runner/work/private_server/private_server

To view this run in a browser, visit:
https://app.terraform.io/app/redline/private_server/runs/run-W4xHMRVaSJgJ416s

Waiting for the plan to start...
Waiting for the plan to start... (30s elapsed)
Waiting for the plan to start... (1m0s elapsed)
Waiting for the plan to start... (1m30s elapsed)
Waiting for the plan to start... (2m0s elapsed)
Waiting for the plan to start... (2m30s elapsed)
Waiting for the plan to start... (3m0s elapsed)

Terraform v1.3.2
on linux_amd64
Initializing plugins and modules...
cloudflare_zone.personal_domain: Refreshing state... [id=cee2af2644f6a3325416173e2d4b44f7]
hcloud_ssh_key.ansible: Refreshing state... [id=8957821]
hcloud_firewall.web_firewall: Refreshing state... [id=603891]
cloudflare_record.aliases["grocy"]: Refreshing state... [id=1a98a4348007c72461ab6752f2c7f9df]
cloudflare_record.aliases["photoprism"]: Refreshing state... [id=6c61639959eeaf8d547dd411419bcf9a]
cloudflare_record.aliases["traefik"]: Refreshing state... [id=efbdd0b7c842cec43a43af72a450fcc0]
cloudflare_record.aliases["ldap"]: Refreshing state... [id=416e67a40f89597f342029d943e253ed]
cloudflare_record.aliases["auth"]: Refreshing state... [id=59a6c353a0138b64113ad34f046c17dc]
cloudflare_record.aliases["grafana"]: Refreshing state... [id=a63efd438a1e819f0e4215e4835a0f24]
hcloud_server.web: Refreshing state... [id=51760523]
cloudflare_record.a: Refreshing state... [id=a44b3519c0443db244e9f2dc5bba8a91]
cloudflare_record.aaaa: Refreshing state... [id=1f54f8a3794295291a1b5a18ed363416]
hcloud_firewall_attachment.firewall_assignments: Refreshing state... [id=603891]
hcloud_volume.data: Refreshing state... [id=24743811]
cloudflare_record.aaaa: Drift detected (update)
hcloud_firewall.web_firewall: Drift detected (update)
hcloud_server.web: Drift detected (update)
cloudflare_record.a: Drift detected (update)
cloudflare_record.aliases["grafana"]: Drift detected (update)
cloudflare_record.aliases["grocy"]: Drift detected (update)
cloudflare_record.aliases["ldap"]: Drift detected (update)
cloudflare_record.aliases["photoprism"]: Drift detected (update)
cloudflare_record.aliases["traefik"]: Drift detected (update)
cloudflare_record.aliases["auth"]: Drift detected (update)

No changes. Your infrastructure matches the configuration.

Terraform has compared your real infrastructure against your configuration
and found no differences, so no changes are needed.

─────────────────────────────────────────────────────────────────────────────

Note: You didn't use the -out option to save this plan, so Terraform can't
guarantee to take exactly these actions if you run "terraform apply" now.

Pushed by: @renovate[bot], Action: pull_request

@renovate renovate bot force-pushed the renovate/grafana-tempo-2.x branch from fc2b359 to bcea40a Compare June 18, 2025 16:57
@renovate renovate bot changed the title chore(deps): update grafana/tempo docker tag to v2.8.0 chore(deps): update grafana/tempo docker tag to v2.8.1 Jun 18, 2025
@github-actions
Copy link

Terraform Format and Style 🖌success

Terraform Initialization ⚙️success

Terraform Validation 🤖success

Terraform Plan 📖success

Show Plan

terraform
Running plan in HCP Terraform. Output will stream here. Pressing Ctrl-C
will stop streaming the logs, but will not stop the plan running remotely.

Preparing the remote plan...

The remote workspace is configured to work with configuration at
infra relative to the target repository.

Terraform will upload the contents of the following directory,
excluding files or directories as defined by a .terraformignore file
at /home/runner/work/private_server/private_server/.terraformignore (if it is present),
in order to capture the filesystem context the remote workspace expects:
    /home/runner/work/private_server/private_server

To view this run in a browser, visit:
https://app.terraform.io/app/redline/private_server/runs/run-ZpycTVU51fsz2gWC

Waiting for the plan to start...

Terraform v1.3.2
on linux_amd64
Initializing plugins and modules...
hcloud_ssh_key.ansible: Refreshing state... [id=8957821]
hcloud_firewall.web_firewall: Refreshing state... [id=603891]
cloudflare_zone.personal_domain: Refreshing state... [id=cee2af2644f6a3325416173e2d4b44f7]
cloudflare_record.aliases["grocy"]: Refreshing state... [id=1a98a4348007c72461ab6752f2c7f9df]
cloudflare_record.aliases["ldap"]: Refreshing state... [id=416e67a40f89597f342029d943e253ed]
cloudflare_record.aliases["grafana"]: Refreshing state... [id=a63efd438a1e819f0e4215e4835a0f24]
cloudflare_record.aliases["photoprism"]: Refreshing state... [id=6c61639959eeaf8d547dd411419bcf9a]
cloudflare_record.aliases["traefik"]: Refreshing state... [id=efbdd0b7c842cec43a43af72a450fcc0]
cloudflare_record.aliases["auth"]: Refreshing state... [id=59a6c353a0138b64113ad34f046c17dc]
hcloud_server.web: Refreshing state... [id=51760523]
hcloud_volume.data: Refreshing state... [id=24743811]
hcloud_firewall_attachment.firewall_assignments: Refreshing state... [id=603891]
cloudflare_record.aaaa: Refreshing state... [id=1f54f8a3794295291a1b5a18ed363416]
cloudflare_record.a: Refreshing state... [id=a44b3519c0443db244e9f2dc5bba8a91]
cloudflare_record.aaaa: Drift detected (update)
hcloud_firewall.web_firewall: Drift detected (update)
cloudflare_record.a: Drift detected (update)
hcloud_server.web: Drift detected (update)
cloudflare_record.aliases["grocy"]: Drift detected (update)
cloudflare_record.aliases["ldap"]: Drift detected (update)
cloudflare_record.aliases["photoprism"]: Drift detected (update)
cloudflare_record.aliases["traefik"]: Drift detected (update)
cloudflare_record.aliases["auth"]: Drift detected (update)
cloudflare_record.aliases["grafana"]: Drift detected (update)

No changes. Your infrastructure matches the configuration.

Terraform has compared your real infrastructure against your configuration
and found no differences, so no changes are needed.

─────────────────────────────────────────────────────────────────────────────

Note: You didn't use the -out option to save this plan, so Terraform can't
guarantee to take exactly these actions if you run "terraform apply" now.

Pushed by: @renovate[bot], Action: pull_request

@renovate renovate bot force-pushed the renovate/grafana-tempo-2.x branch from bcea40a to 9b368ce Compare August 6, 2025 21:44
@renovate renovate bot changed the title chore(deps): update grafana/tempo docker tag to v2.8.1 chore(deps): update grafana/tempo docker tag to v2.8.2 Aug 6, 2025
@github-actions
Copy link

github-actions bot commented Aug 6, 2025

Terraform Format and Style 🖌success

Terraform Initialization ⚙️success

Terraform Validation 🤖success

Terraform Plan 📖success

Show Plan

terraform
Running plan in HCP Terraform. Output will stream here. Pressing Ctrl-C
will stop streaming the logs, but will not stop the plan running remotely.

Preparing the remote plan...

The remote workspace is configured to work with configuration at
infra relative to the target repository.

Terraform will upload the contents of the following directory,
excluding files or directories as defined by a .terraformignore file
at /home/runner/work/private_server/private_server/.terraformignore (if it is present),
in order to capture the filesystem context the remote workspace expects:
    /home/runner/work/private_server/private_server

To view this run in a browser, visit:
https://app.terraform.io/app/redline/private_server/runs/run-moAiSRhXJBaGYyKZ

Waiting for the plan to start...

Terraform v1.3.2
on linux_amd64
Initializing plugins and modules...
cloudflare_zone.personal_domain: Refreshing state... [id=cee2af2644f6a3325416173e2d4b44f7]
hcloud_ssh_key.ansible: Refreshing state... [id=8957821]
hcloud_firewall.web_firewall: Refreshing state... [id=603891]
cloudflare_record.aliases["grocy"]: Refreshing state... [id=1a98a4348007c72461ab6752f2c7f9df]
cloudflare_record.aliases["auth"]: Refreshing state... [id=59a6c353a0138b64113ad34f046c17dc]
cloudflare_record.aliases["traefik"]: Refreshing state... [id=efbdd0b7c842cec43a43af72a450fcc0]
cloudflare_record.aliases["photoprism"]: Refreshing state... [id=6c61639959eeaf8d547dd411419bcf9a]
cloudflare_record.aliases["grafana"]: Refreshing state... [id=a63efd438a1e819f0e4215e4835a0f24]
cloudflare_record.aliases["ldap"]: Refreshing state... [id=416e67a40f89597f342029d943e253ed]
hcloud_server.web: Refreshing state... [id=51760523]
hcloud_firewall_attachment.firewall_assignments: Refreshing state... [id=603891]
cloudflare_record.aaaa: Refreshing state... [id=1f54f8a3794295291a1b5a18ed363416]
cloudflare_record.a: Refreshing state... [id=a44b3519c0443db244e9f2dc5bba8a91]
hcloud_volume.data: Refreshing state... [id=24743811]
hcloud_server.web: Drift detected (update)
cloudflare_record.aaaa: Drift detected (update)
cloudflare_record.a: Drift detected (update)
cloudflare_record.aliases["ldap"]: Drift detected (update)
cloudflare_record.aliases["photoprism"]: Drift detected (update)
cloudflare_record.aliases["traefik"]: Drift detected (update)
cloudflare_record.aliases["auth"]: Drift detected (update)
cloudflare_record.aliases["grafana"]: Drift detected (update)
cloudflare_record.aliases["grocy"]: Drift detected (update)
hcloud_firewall.web_firewall: Drift detected (update)

No changes. Your infrastructure matches the configuration.

Terraform has compared your real infrastructure against your configuration
and found no differences, so no changes are needed.

─────────────────────────────────────────────────────────────────────────────

Note: You didn't use the -out option to save this plan, so Terraform can't
guarantee to take exactly these actions if you run "terraform apply" now.

Pushed by: @renovate[bot], Action: pull_request

@renovate renovate bot force-pushed the renovate/grafana-tempo-2.x branch from 9b368ce to de06a1f Compare October 13, 2025 14:42
@renovate renovate bot changed the title chore(deps): update grafana/tempo docker tag to v2.8.2 chore(deps): update grafana/tempo docker tag to v2.9.0 Oct 13, 2025
@github-actions
Copy link

Terraform Format and Style 🖌success

Terraform Initialization ⚙️success

Terraform Validation 🤖success

Terraform Plan 📖success

Show Plan

terraform
Running plan in HCP Terraform. Output will stream here. Pressing Ctrl-C
will stop streaming the logs, but will not stop the plan running remotely.

Preparing the remote plan...

The remote workspace is configured to work with configuration at
infra relative to the target repository.

Terraform will upload the contents of the following directory,
excluding files or directories as defined by a .terraformignore file
at /home/runner/work/private_server/private_server/.terraformignore (if it is present),
in order to capture the filesystem context the remote workspace expects:
    /home/runner/work/private_server/private_server

To view this run in a browser, visit:
https://app.terraform.io/app/redline/private_server/runs/run-t9bgq3ZsPrmwqRYP

Waiting for the plan to start...

Terraform v1.3.2
on linux_amd64
Initializing plugins and modules...
hcloud_ssh_key.ansible: Refreshing state... [id=8957821]
hcloud_firewall.web_firewall: Refreshing state... [id=603891]
cloudflare_zone.personal_domain: Refreshing state... [id=cee2af2644f6a3325416173e2d4b44f7]
cloudflare_record.aliases["auth"]: Refreshing state... [id=59a6c353a0138b64113ad34f046c17dc]
cloudflare_record.aliases["photoprism"]: Refreshing state... [id=6c61639959eeaf8d547dd411419bcf9a]
cloudflare_record.aliases["grafana"]: Refreshing state... [id=a63efd438a1e819f0e4215e4835a0f24]
cloudflare_record.aliases["grocy"]: Refreshing state... [id=1a98a4348007c72461ab6752f2c7f9df]
cloudflare_record.aliases["ldap"]: Refreshing state... [id=416e67a40f89597f342029d943e253ed]
cloudflare_record.aliases["traefik"]: Refreshing state... [id=efbdd0b7c842cec43a43af72a450fcc0]
hcloud_server.web: Refreshing state... [id=51760523]
hcloud_volume.data: Refreshing state... [id=24743811]
hcloud_firewall_attachment.firewall_assignments: Refreshing state... [id=603891]
cloudflare_record.a: Refreshing state... [id=a44b3519c0443db244e9f2dc5bba8a91]
cloudflare_record.aaaa: Refreshing state... [id=1f54f8a3794295291a1b5a18ed363416]
hcloud_firewall.web_firewall: Drift detected (update)
cloudflare_record.a: Drift detected (delete)
cloudflare_record.aliases["auth"]: Drift detected (delete)
cloudflare_record.aliases["grafana"]: Drift detected (delete)
cloudflare_record.aliases["grocy"]: Drift detected (delete)
cloudflare_record.aliases["ldap"]: Drift detected (delete)
cloudflare_record.aliases["photoprism"]: Drift detected (delete)
cloudflare_record.aliases["traefik"]: Drift detected (delete)
cloudflare_record.aaaa: Drift detected (delete)
hcloud_server.web: Drift detected (update)

Terraform used the selected providers to generate the following execution
plan. Resource actions are indicated with the following symbols:
  + create

Terraform will perform the following actions:

  # cloudflare_record.a will be created
  + resource "cloudflare_record" "a" {
      + allow_overwrite = false
      + content         = "78.47.192.97"
      + created_on      = (known after apply)
      + hostname        = (known after apply)
      + id              = (known after apply)
      + metadata        = (known after apply)
      + modified_on     = (known after apply)
      + name            = "pascal.build"
      + proxiable       = (known after apply)
      + ttl             = 300
      + type            = "A"
      + value           = (known after apply)
      + zone_id         = "cee2af2644f6a3325416173e2d4b44f7"
    }

  # cloudflare_record.aaaa will be created
  + resource "cloudflare_record" "aaaa" {
      + allow_overwrite = false
      + content         = "2a01:4f8:c2c:1ff1::1"
      + created_on      = (known after apply)
      + hostname        = (known after apply)
      + id              = (known after apply)
      + metadata        = (known after apply)
      + modified_on     = (known after apply)
      + name            = "pascal.build"
      + proxiable       = (known after apply)
      + ttl             = 300
      + type            = "AAAA"
      + value           = (known after apply)
      + zone_id         = "cee2af2644f6a3325416173e2d4b44f7"
    }

  # cloudflare_record.aliases["auth"] will be created
  + resource "cloudflare_record" "aliases" {
      + allow_overwrite = false
      + content         = "pascal.build"
      + created_on      = (known after apply)
      + hostname        = (known after apply)
      + id              = (known after apply)
      + metadata        = (known after apply)
      + modified_on     = (known after apply)
      + name            = "auth"
      + proxiable       = (known after apply)
      + ttl             = 300
      + type            = "CNAME"
      + value           = (known after apply)
      + zone_id         = "cee2af2644f6a3325416173e2d4b44f7"
    }

  # cloudflare_record.aliases["grafana"] will be created
  + resource "cloudflare_record" "aliases" {
      + allow_overwrite = false
      + content         = "pascal.build"
      + created_on      = (known after apply)
      + hostname        = (known after apply)
      + id              = (known after apply)
      + metadata        = (known after apply)
      + modified_on     = (known after apply)
      + name            = "grafana"
      + proxiable       = (known after apply)
      + ttl             = 300
      + type            = "CNAME"
      + value           = (known after apply)
      + zone_id         = "cee2af2644f6a3325416173e2d4b44f7"
    }

  # cloudflare_record.aliases["grocy"] will be created
  + resource "cloudflare_record" "aliases" {
      + allow_overwrite = false
      + content         = "pascal.build"
      + created_on      = (known after apply)
      + hostname        = (known after apply)
      + id              = (known after apply)
      + metadata        = (known after apply)
      + modified_on     = (known after apply)
      + name            = "grocy"
      + proxiable       = (known after apply)
      + ttl             = 300
      + type            = "CNAME"
      + value           = (known after apply)
      + zone_id         = "cee2af2644f6a3325416173e2d4b44f7"
    }

  # cloudflare_record.aliases["ldap"] will be created
  + resource "cloudflare_record" "aliases" {
      + allow_overwrite = false
      + content         = "pascal.build"
      + created_on      = (known after apply)
      + hostname        = (known after apply)
      + id              = (known after apply)
      + metadata        = (known after apply)
      + modified_on     = (known after apply)
      + name            = "ldap"
      + proxiable       = (known after apply)
      + ttl             = 300
      + type            = "CNAME"
      + value           = (known after apply)
      + zone_id         = "cee2af2644f6a3325416173e2d4b44f7"
    }

  # cloudflare_record.aliases["photoprism"] will be created
  + resource "cloudflare_record" "aliases" {
      + allow_overwrite = false
      + content         = "pascal.build"
      + created_on      = (known after apply)
      + hostname        = (known after apply)
      + id              = (known after apply)
      + metadata        = (known after apply)
      + modified_on     = (known after apply)
      + name            = "photoprism"
      + proxiable       = (known after apply)
      + ttl             = 300
      + type            = "CNAME"
      + value           = (known after apply)
      + zone_id         = "cee2af2644f6a3325416173e2d4b44f7"
    }

  # cloudflare_record.aliases["traefik"] will be created
  + resource "cloudflare_record" "aliases" {
      + allow_overwrite = false
      + content         = "pascal.build"
      + created_on      = (known after apply)
      + hostname        = (known after apply)
      + id              = (known after apply)
      + metadata        = (known after apply)
      + modified_on     = (known after apply)
      + name            = "traefik"
      + proxiable       = (known after apply)
      + ttl             = 300
      + type            = "CNAME"
      + value           = (known after apply)
      + zone_id         = "cee2af2644f6a3325416173e2d4b44f7"
    }

Plan: 8 to add, 0 to change, 0 to destroy.

─────────────────────────────────────────────────────────────────────────────

Note: You didn't use the -out option to save this plan, so Terraform can't
guarantee to take exactly these actions if you run "terraform apply" now.

Pushed by: @renovate[bot], Action: pull_request

@renovate renovate bot force-pushed the renovate/grafana-tempo-2.x branch from de06a1f to 5dc6697 Compare January 19, 2026 19:24
@renovate renovate bot changed the title chore(deps): update grafana/tempo docker tag to v2.9.0 chore(deps): update grafana/tempo docker tag to v2.9.1 Jan 19, 2026
@github-actions
Copy link

Terraform Format and Style 🖌success

Terraform Initialization ⚙️success

Terraform Validation 🤖success

Terraform Plan 📖success

Show Plan

terraform
Running plan in HCP Terraform. Output will stream here. Pressing Ctrl-C
will stop streaming the logs, but will not stop the plan running remotely.

Preparing the remote plan...

The remote workspace is configured to work with configuration at
infra relative to the target repository.

Terraform will upload the contents of the following directory,
excluding files or directories as defined by a .terraformignore file
at /home/runner/work/private_server/private_server/.terraformignore (if it is present),
in order to capture the filesystem context the remote workspace expects:
    /home/runner/work/private_server/private_server

To view this run in a browser, visit:
https://app.terraform.io/app/redline/private_server/runs/run-BfpzMHAD2TNWtktt

Waiting for the plan to start...

Terraform v1.3.2
on linux_amd64
Initializing plugins and modules...
hcloud_ssh_key.ansible: Refreshing state... [id=8957821]
hcloud_firewall.web_firewall: Refreshing state... [id=603891]
cloudflare_zone.personal_domain: Refreshing state... [id=cee2af2644f6a3325416173e2d4b44f7]
cloudflare_record.aliases["ldap"]: Refreshing state... [id=416e67a40f89597f342029d943e253ed]
cloudflare_record.aliases["grafana"]: Refreshing state... [id=a63efd438a1e819f0e4215e4835a0f24]
cloudflare_record.aliases["auth"]: Refreshing state... [id=59a6c353a0138b64113ad34f046c17dc]
cloudflare_record.aliases["grocy"]: Refreshing state... [id=1a98a4348007c72461ab6752f2c7f9df]
cloudflare_record.aliases["photoprism"]: Refreshing state... [id=6c61639959eeaf8d547dd411419bcf9a]
cloudflare_record.aliases["traefik"]: Refreshing state... [id=efbdd0b7c842cec43a43af72a450fcc0]
hcloud_server.web: Refreshing state... [id=51760523]
hcloud_firewall_attachment.firewall_assignments: Refreshing state... [id=603891]
cloudflare_record.aaaa: Refreshing state... [id=1f54f8a3794295291a1b5a18ed363416]
cloudflare_record.a: Refreshing state... [id=a44b3519c0443db244e9f2dc5bba8a91]
hcloud_volume.data: Refreshing state... [id=24743811]
cloudflare_record.aliases["traefik"]: Drift detected (delete)
cloudflare_record.aliases["auth"]: Drift detected (delete)
cloudflare_record.aliases["grafana"]: Drift detected (delete)
cloudflare_record.aliases["grocy"]: Drift detected (delete)
cloudflare_record.aliases["ldap"]: Drift detected (delete)
cloudflare_record.aliases["photoprism"]: Drift detected (delete)
cloudflare_record.a: Drift detected (delete)
hcloud_server.web: Drift detected (update)
hcloud_firewall.web_firewall: Drift detected (update)
cloudflare_record.aaaa: Drift detected (delete)

Terraform used the selected providers to generate the following execution
plan. Resource actions are indicated with the following symbols:
  + create

Terraform will perform the following actions:

  # cloudflare_record.a will be created
  + resource "cloudflare_record" "a" {
      + allow_overwrite = false
      + content         = "78.47.192.97"
      + created_on      = (known after apply)
      + hostname        = (known after apply)
      + id              = (known after apply)
      + metadata        = (known after apply)
      + modified_on     = (known after apply)
      + name            = "pascal.build"
      + proxiable       = (known after apply)
      + ttl             = 300
      + type            = "A"
      + value           = (known after apply)
      + zone_id         = "cee2af2644f6a3325416173e2d4b44f7"
    }

  # cloudflare_record.aaaa will be created
  + resource "cloudflare_record" "aaaa" {
      + allow_overwrite = false
      + content         = "2a01:4f8:c2c:1ff1::1"
      + created_on      = (known after apply)
      + hostname        = (known after apply)
      + id              = (known after apply)
      + metadata        = (known after apply)
      + modified_on     = (known after apply)
      + name            = "pascal.build"
      + proxiable       = (known after apply)
      + ttl             = 300
      + type            = "AAAA"
      + value           = (known after apply)
      + zone_id         = "cee2af2644f6a3325416173e2d4b44f7"
    }

  # cloudflare_record.aliases["auth"] will be created
  + resource "cloudflare_record" "aliases" {
      + allow_overwrite = false
      + content         = "pascal.build"
      + created_on      = (known after apply)
      + hostname        = (known after apply)
      + id              = (known after apply)
      + metadata        = (known after apply)
      + modified_on     = (known after apply)
      + name            = "auth"
      + proxiable       = (known after apply)
      + ttl             = 300
      + type            = "CNAME"
      + value           = (known after apply)
      + zone_id         = "cee2af2644f6a3325416173e2d4b44f7"
    }

  # cloudflare_record.aliases["grafana"] will be created
  + resource "cloudflare_record" "aliases" {
      + allow_overwrite = false
      + content         = "pascal.build"
      + created_on      = (known after apply)
      + hostname        = (known after apply)
      + id              = (known after apply)
      + metadata        = (known after apply)
      + modified_on     = (known after apply)
      + name            = "grafana"
      + proxiable       = (known after apply)
      + ttl             = 300
      + type            = "CNAME"
      + value           = (known after apply)
      + zone_id         = "cee2af2644f6a3325416173e2d4b44f7"
    }

  # cloudflare_record.aliases["grocy"] will be created
  + resource "cloudflare_record" "aliases" {
      + allow_overwrite = false
      + content         = "pascal.build"
      + created_on      = (known after apply)
      + hostname        = (known after apply)
      + id              = (known after apply)
      + metadata        = (known after apply)
      + modified_on     = (known after apply)
      + name            = "grocy"
      + proxiable       = (known after apply)
      + ttl             = 300
      + type            = "CNAME"
      + value           = (known after apply)
      + zone_id         = "cee2af2644f6a3325416173e2d4b44f7"
    }

  # cloudflare_record.aliases["ldap"] will be created
  + resource "cloudflare_record" "aliases" {
      + allow_overwrite = false
      + content         = "pascal.build"
      + created_on      = (known after apply)
      + hostname        = (known after apply)
      + id              = (known after apply)
      + metadata        = (known after apply)
      + modified_on     = (known after apply)
      + name            = "ldap"
      + proxiable       = (known after apply)
      + ttl             = 300
      + type            = "CNAME"
      + value           = (known after apply)
      + zone_id         = "cee2af2644f6a3325416173e2d4b44f7"
    }

  # cloudflare_record.aliases["photoprism"] will be created
  + resource "cloudflare_record" "aliases" {
      + allow_overwrite = false
      + content         = "pascal.build"
      + created_on      = (known after apply)
      + hostname        = (known after apply)
      + id              = (known after apply)
      + metadata        = (known after apply)
      + modified_on     = (known after apply)
      + name            = "photoprism"
      + proxiable       = (known after apply)
      + ttl             = 300
      + type            = "CNAME"
      + value           = (known after apply)
      + zone_id         = "cee2af2644f6a3325416173e2d4b44f7"
    }

  # cloudflare_record.aliases["traefik"] will be created
  + resource "cloudflare_record" "aliases" {
      + allow_overwrite = false
      + content         = "pascal.build"
      + created_on      = (known after apply)
      + hostname        = (known after apply)
      + id              = (known after apply)
      + metadata        = (known after apply)
      + modified_on     = (known after apply)
      + name            = "traefik"
      + proxiable       = (known after apply)
      + ttl             = 300
      + type            = "CNAME"
      + value           = (known after apply)
      + zone_id         = "cee2af2644f6a3325416173e2d4b44f7"
    }

Plan: 8 to add, 0 to change, 0 to destroy.

─────────────────────────────────────────────────────────────────────────────

Note: You didn't use the -out option to save this plan, so Terraform can't
guarantee to take exactly these actions if you run "terraform apply" now.

Pushed by: @renovate[bot], Action: pull_request

@renovate renovate bot force-pushed the renovate/grafana-tempo-2.x branch from 5dc6697 to 430527f Compare January 26, 2026 18:44
@renovate renovate bot changed the title chore(deps): update grafana/tempo docker tag to v2.9.1 chore(deps): update grafana/tempo docker tag to v2.10.0 Jan 26, 2026
@github-actions
Copy link

Terraform Format and Style 🖌success

Terraform Initialization ⚙️success

Terraform Validation 🤖success

Terraform Plan 📖success

Show Plan

terraform
Running plan in HCP Terraform. Output will stream here. Pressing Ctrl-C
will stop streaming the logs, but will not stop the plan running remotely.

Preparing the remote plan...

The remote workspace is configured to work with configuration at
infra relative to the target repository.

Terraform will upload the contents of the following directory,
excluding files or directories as defined by a .terraformignore file
at /home/runner/work/private_server/private_server/.terraformignore (if it is present),
in order to capture the filesystem context the remote workspace expects:
    /home/runner/work/private_server/private_server

To view this run in a browser, visit:
https://app.terraform.io/app/redline/private_server/runs/run-xx5Zn4DomWSAL4so

Waiting for the plan to start...

Terraform v1.3.2
on linux_amd64
Initializing plugins and modules...
hcloud_ssh_key.ansible: Refreshing state... [id=8957821]
hcloud_firewall.web_firewall: Refreshing state... [id=603891]
cloudflare_zone.personal_domain: Refreshing state... [id=cee2af2644f6a3325416173e2d4b44f7]
cloudflare_record.aliases["grafana"]: Refreshing state... [id=a63efd438a1e819f0e4215e4835a0f24]
cloudflare_record.aliases["photoprism"]: Refreshing state... [id=6c61639959eeaf8d547dd411419bcf9a]
cloudflare_record.aliases["grocy"]: Refreshing state... [id=1a98a4348007c72461ab6752f2c7f9df]
cloudflare_record.aliases["traefik"]: Refreshing state... [id=efbdd0b7c842cec43a43af72a450fcc0]
cloudflare_record.aliases["auth"]: Refreshing state... [id=59a6c353a0138b64113ad34f046c17dc]
cloudflare_record.aliases["ldap"]: Refreshing state... [id=416e67a40f89597f342029d943e253ed]
hcloud_server.web: Refreshing state... [id=51760523]
hcloud_volume.data: Refreshing state... [id=24743811]
hcloud_firewall_attachment.firewall_assignments: Refreshing state... [id=603891]
cloudflare_record.a: Refreshing state... [id=a44b3519c0443db244e9f2dc5bba8a91]
cloudflare_record.aaaa: Refreshing state... [id=1f54f8a3794295291a1b5a18ed363416]
cloudflare_record.aaaa: Drift detected (delete)
cloudflare_record.aliases["traefik"]: Drift detected (delete)
cloudflare_record.aliases["auth"]: Drift detected (delete)
cloudflare_record.aliases["grafana"]: Drift detected (delete)
cloudflare_record.aliases["grocy"]: Drift detected (delete)
cloudflare_record.aliases["ldap"]: Drift detected (delete)
cloudflare_record.aliases["photoprism"]: Drift detected (delete)
hcloud_firewall.web_firewall: Drift detected (update)
hcloud_server.web: Drift detected (update)
cloudflare_record.a: Drift detected (delete)

Terraform used the selected providers to generate the following execution
plan. Resource actions are indicated with the following symbols:
  + create

Terraform will perform the following actions:

  # cloudflare_record.a will be created
  + resource "cloudflare_record" "a" {
      + allow_overwrite = false
      + content         = "78.47.192.97"
      + created_on      = (known after apply)
      + hostname        = (known after apply)
      + id              = (known after apply)
      + metadata        = (known after apply)
      + modified_on     = (known after apply)
      + name            = "pascal.build"
      + proxiable       = (known after apply)
      + ttl             = 300
      + type            = "A"
      + value           = (known after apply)
      + zone_id         = "cee2af2644f6a3325416173e2d4b44f7"
    }

  # cloudflare_record.aaaa will be created
  + resource "cloudflare_record" "aaaa" {
      + allow_overwrite = false
      + content         = "2a01:4f8:c2c:1ff1::1"
      + created_on      = (known after apply)
      + hostname        = (known after apply)
      + id              = (known after apply)
      + metadata        = (known after apply)
      + modified_on     = (known after apply)
      + name            = "pascal.build"
      + proxiable       = (known after apply)
      + ttl             = 300
      + type            = "AAAA"
      + value           = (known after apply)
      + zone_id         = "cee2af2644f6a3325416173e2d4b44f7"
    }

  # cloudflare_record.aliases["auth"] will be created
  + resource "cloudflare_record" "aliases" {
      + allow_overwrite = false
      + content         = "pascal.build"
      + created_on      = (known after apply)
      + hostname        = (known after apply)
      + id              = (known after apply)
      + metadata        = (known after apply)
      + modified_on     = (known after apply)
      + name            = "auth"
      + proxiable       = (known after apply)
      + ttl             = 300
      + type            = "CNAME"
      + value           = (known after apply)
      + zone_id         = "cee2af2644f6a3325416173e2d4b44f7"
    }

  # cloudflare_record.aliases["grafana"] will be created
  + resource "cloudflare_record" "aliases" {
      + allow_overwrite = false
      + content         = "pascal.build"
      + created_on      = (known after apply)
      + hostname        = (known after apply)
      + id              = (known after apply)
      + metadata        = (known after apply)
      + modified_on     = (known after apply)
      + name            = "grafana"
      + proxiable       = (known after apply)
      + ttl             = 300
      + type            = "CNAME"
      + value           = (known after apply)
      + zone_id         = "cee2af2644f6a3325416173e2d4b44f7"
    }

  # cloudflare_record.aliases["grocy"] will be created
  + resource "cloudflare_record" "aliases" {
      + allow_overwrite = false
      + content         = "pascal.build"
      + created_on      = (known after apply)
      + hostname        = (known after apply)
      + id              = (known after apply)
      + metadata        = (known after apply)
      + modified_on     = (known after apply)
      + name            = "grocy"
      + proxiable       = (known after apply)
      + ttl             = 300
      + type            = "CNAME"
      + value           = (known after apply)
      + zone_id         = "cee2af2644f6a3325416173e2d4b44f7"
    }

  # cloudflare_record.aliases["ldap"] will be created
  + resource "cloudflare_record" "aliases" {
      + allow_overwrite = false
      + content         = "pascal.build"
      + created_on      = (known after apply)
      + hostname        = (known after apply)
      + id              = (known after apply)
      + metadata        = (known after apply)
      + modified_on     = (known after apply)
      + name            = "ldap"
      + proxiable       = (known after apply)
      + ttl             = 300
      + type            = "CNAME"
      + value           = (known after apply)
      + zone_id         = "cee2af2644f6a3325416173e2d4b44f7"
    }

  # cloudflare_record.aliases["photoprism"] will be created
  + resource "cloudflare_record" "aliases" {
      + allow_overwrite = false
      + content         = "pascal.build"
      + created_on      = (known after apply)
      + hostname        = (known after apply)
      + id              = (known after apply)
      + metadata        = (known after apply)
      + modified_on     = (known after apply)
      + name            = "photoprism"
      + proxiable       = (known after apply)
      + ttl             = 300
      + type            = "CNAME"
      + value           = (known after apply)
      + zone_id         = "cee2af2644f6a3325416173e2d4b44f7"
    }

  # cloudflare_record.aliases["traefik"] will be created
  + resource "cloudflare_record" "aliases" {
      + allow_overwrite = false
      + content         = "pascal.build"
      + created_on      = (known after apply)
      + hostname        = (known after apply)
      + id              = (known after apply)
      + metadata        = (known after apply)
      + modified_on     = (known after apply)
      + name            = "traefik"
      + proxiable       = (known after apply)
      + ttl             = 300
      + type            = "CNAME"
      + value           = (known after apply)
      + zone_id         = "cee2af2644f6a3325416173e2d4b44f7"
    }

Plan: 8 to add, 0 to change, 0 to destroy.

─────────────────────────────────────────────────────────────────────────────

Note: You didn't use the -out option to save this plan, so Terraform can't
guarantee to take exactly these actions if you run "terraform apply" now.

Pushed by: @renovate[bot], Action: pull_request

@renovate renovate bot force-pushed the renovate/grafana-tempo-2.x branch from 430527f to 0cd074b Compare February 17, 2026 15:31
@renovate renovate bot changed the title chore(deps): update grafana/tempo docker tag to v2.10.0 chore(deps): update grafana/tempo docker tag to v2.10.1 Feb 17, 2026
@github-actions
Copy link

Terraform Format and Style 🖌success

Terraform Initialization ⚙️success

Terraform Validation 🤖success

Terraform Plan 📖success

Show Plan

terraform
Running plan in HCP Terraform. Output will stream here. Pressing Ctrl-C
will stop streaming the logs, but will not stop the plan running remotely.

Preparing the remote plan...

The remote workspace is configured to work with configuration at
infra relative to the target repository.

Terraform will upload the contents of the following directory,
excluding files or directories as defined by a .terraformignore file
at /home/runner/work/private_server/private_server/.terraformignore (if it is present),
in order to capture the filesystem context the remote workspace expects:
    /home/runner/work/private_server/private_server

To view this run in a browser, visit:
https://app.terraform.io/app/redline/private_server/runs/run-WPLsw5cY7FsQacCi

Waiting for the plan to start...

Terraform v1.3.2
on linux_amd64
Initializing plugins and modules...
hcloud_ssh_key.ansible: Refreshing state... [id=8957821]
hcloud_firewall.web_firewall: Refreshing state... [id=603891]
cloudflare_zone.personal_domain: Refreshing state... [id=cee2af2644f6a3325416173e2d4b44f7]
hcloud_server.web: Refreshing state... [id=51760523]
hcloud_volume.data: Refreshing state... [id=24743811]
hcloud_firewall_attachment.firewall_assignments: Refreshing state... [id=603891]
cloudflare_record.aaaa: Refreshing state... [id=1f54f8a3794295291a1b5a18ed363416]
cloudflare_record.aliases["grafana"]: Refreshing state... [id=a63efd438a1e819f0e4215e4835a0f24]
cloudflare_record.aliases["traefik"]: Refreshing state... [id=efbdd0b7c842cec43a43af72a450fcc0]
cloudflare_record.a: Refreshing state... [id=a44b3519c0443db244e9f2dc5bba8a91]
cloudflare_record.aliases["auth"]: Refreshing state... [id=59a6c353a0138b64113ad34f046c17dc]
cloudflare_record.aliases["grocy"]: Refreshing state... [id=1a98a4348007c72461ab6752f2c7f9df]
cloudflare_record.aliases["ldap"]: Refreshing state... [id=416e67a40f89597f342029d943e253ed]
cloudflare_record.aliases["photoprism"]: Refreshing state... [id=6c61639959eeaf8d547dd411419bcf9a]
cloudflare_record.a: Drift detected (delete)
cloudflare_record.aliases["traefik"]: Drift detected (delete)
cloudflare_record.aliases["auth"]: Drift detected (delete)
cloudflare_record.aliases["grafana"]: Drift detected (delete)
cloudflare_record.aliases["grocy"]: Drift detected (delete)
cloudflare_record.aliases["ldap"]: Drift detected (delete)
cloudflare_record.aliases["photoprism"]: Drift detected (delete)
hcloud_server.web: Drift detected (update)
cloudflare_record.aaaa: Drift detected (delete)
hcloud_firewall.web_firewall: Drift detected (update)

Terraform used the selected providers to generate the following execution
plan. Resource actions are indicated with the following symbols:
  + create

Terraform will perform the following actions:

  # cloudflare_record.a will be created
  + resource "cloudflare_record" "a" {
      + allow_overwrite = false
      + content         = "78.47.192.97"
      + created_on      = (known after apply)
      + hostname        = (known after apply)
      + id              = (known after apply)
      + metadata        = (known after apply)
      + modified_on     = (known after apply)
      + name            = "pascal.build"
      + proxiable       = (known after apply)
      + ttl             = 300
      + type            = "A"
      + value           = (known after apply)
      + zone_id         = "cee2af2644f6a3325416173e2d4b44f7"
    }

  # cloudflare_record.aaaa will be created
  + resource "cloudflare_record" "aaaa" {
      + allow_overwrite = false
      + content         = "2a01:4f8:c2c:1ff1::1"
      + created_on      = (known after apply)
      + hostname        = (known after apply)
      + id              = (known after apply)
      + metadata        = (known after apply)
      + modified_on     = (known after apply)
      + name            = "pascal.build"
      + proxiable       = (known after apply)
      + ttl             = 300
      + type            = "AAAA"
      + value           = (known after apply)
      + zone_id         = "cee2af2644f6a3325416173e2d4b44f7"
    }

  # cloudflare_record.aliases["auth"] will be created
  + resource "cloudflare_record" "aliases" {
      + allow_overwrite = false
      + content         = "pascal.build"
      + created_on      = (known after apply)
      + hostname        = (known after apply)
      + id              = (known after apply)
      + metadata        = (known after apply)
      + modified_on     = (known after apply)
      + name            = "auth"
      + proxiable       = (known after apply)
      + ttl             = 300
      + type            = "CNAME"
      + value           = (known after apply)
      + zone_id         = "cee2af2644f6a3325416173e2d4b44f7"
    }

  # cloudflare_record.aliases["grafana"] will be created
  + resource "cloudflare_record" "aliases" {
      + allow_overwrite = false
      + content         = "pascal.build"
      + created_on      = (known after apply)
      + hostname        = (known after apply)
      + id              = (known after apply)
      + metadata        = (known after apply)
      + modified_on     = (known after apply)
      + name            = "grafana"
      + proxiable       = (known after apply)
      + ttl             = 300
      + type            = "CNAME"
      + value           = (known after apply)
      + zone_id         = "cee2af2644f6a3325416173e2d4b44f7"
    }

  # cloudflare_record.aliases["grocy"] will be created
  + resource "cloudflare_record" "aliases" {
      + allow_overwrite = false
      + content         = "pascal.build"
      + created_on      = (known after apply)
      + hostname        = (known after apply)
      + id              = (known after apply)
      + metadata        = (known after apply)
      + modified_on     = (known after apply)
      + name            = "grocy"
      + proxiable       = (known after apply)
      + ttl             = 300
      + type            = "CNAME"
      + value           = (known after apply)
      + zone_id         = "cee2af2644f6a3325416173e2d4b44f7"
    }

  # cloudflare_record.aliases["ldap"] will be created
  + resource "cloudflare_record" "aliases" {
      + allow_overwrite = false
      + content         = "pascal.build"
      + created_on      = (known after apply)
      + hostname        = (known after apply)
      + id              = (known after apply)
      + metadata        = (known after apply)
      + modified_on     = (known after apply)
      + name            = "ldap"
      + proxiable       = (known after apply)
      + ttl             = 300
      + type            = "CNAME"
      + value           = (known after apply)
      + zone_id         = "cee2af2644f6a3325416173e2d4b44f7"
    }

  # cloudflare_record.aliases["photoprism"] will be created
  + resource "cloudflare_record" "aliases" {
      + allow_overwrite = false
      + content         = "pascal.build"
      + created_on      = (known after apply)
      + hostname        = (known after apply)
      + id              = (known after apply)
      + metadata        = (known after apply)
      + modified_on     = (known after apply)
      + name            = "photoprism"
      + proxiable       = (known after apply)
      + ttl             = 300
      + type            = "CNAME"
      + value           = (known after apply)
      + zone_id         = "cee2af2644f6a3325416173e2d4b44f7"
    }

  # cloudflare_record.aliases["traefik"] will be created
  + resource "cloudflare_record" "aliases" {
      + allow_overwrite = false
      + content         = "pascal.build"
      + created_on      = (known after apply)
      + hostname        = (known after apply)
      + id              = (known after apply)
      + metadata        = (known after apply)
      + modified_on     = (known after apply)
      + name            = "traefik"
      + proxiable       = (known after apply)
      + ttl             = 300
      + type            = "CNAME"
      + value           = (known after apply)
      + zone_id         = "cee2af2644f6a3325416173e2d4b44f7"
    }

Plan: 8 to add, 0 to change, 0 to destroy.

─────────────────────────────────────────────────────────────────────────────

Note: You didn't use the -out option to save this plan, so Terraform can't
guarantee to take exactly these actions if you run "terraform apply" now.

Pushed by: @renovate[bot], Action: pull_request

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

0 participants