Skip to content

Commit 021c338

Browse files
Modify docs, examples and tests to reference prod-us-east-0 instead of us. (#2032)
1 parent fd62e63 commit 021c338

File tree

15 files changed

+35
-35
lines changed

15 files changed

+35
-35
lines changed

docs/index.md

+2-2
Original file line numberDiff line numberDiff line change
@@ -58,7 +58,7 @@ resource "grafana_cloud_stack" "my_stack" {
5858
5959
name = "myteststack"
6060
slug = "myteststack"
61-
region_slug = "us"
61+
region_slug = "prod-us-east-0"
6262
}
6363
6464
// Step 2: Create a service account and key for the stack
@@ -102,7 +102,7 @@ variable "cloud_access_policy_token" {
102102
}
103103
variable "stack_slug" {}
104104
variable "cloud_region" {
105-
default = "us"
105+
default = "prod-us-east-0"
106106
}
107107
108108
// Step 1: Create a stack

docs/resources/cloud_access_policy.md

+2-2
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ data "grafana_cloud_organization" "current" {
2727
}
2828
2929
resource "grafana_cloud_access_policy" "test" {
30-
region = "us"
30+
region = "prod-us-east-0"
3131
name = "my-policy"
3232
display_name = "My Policy"
3333
@@ -44,7 +44,7 @@ resource "grafana_cloud_access_policy" "test" {
4444
}
4545
4646
resource "grafana_cloud_access_policy_token" "test" {
47-
region = "us"
47+
region = "prod-us-east-0"
4848
access_policy_id = grafana_cloud_access_policy.test.policy_id
4949
name = "my-policy-token"
5050
display_name = "My Policy Token"

docs/resources/cloud_access_policy_token.md

+2-2
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ data "grafana_cloud_organization" "current" {
2727
}
2828
2929
resource "grafana_cloud_access_policy" "test" {
30-
region = "us"
30+
region = "prod-us-east-0"
3131
name = "my-policy"
3232
display_name = "My Policy"
3333
@@ -44,7 +44,7 @@ resource "grafana_cloud_access_policy" "test" {
4444
}
4545
4646
resource "grafana_cloud_access_policy_token" "test" {
47-
region = "us"
47+
region = "prod-us-east-0"
4848
access_policy_id = grafana_cloud_access_policy.test.policy_id
4949
name = "my-policy-token"
5050
display_name = "My Policy Token"

docs/resources/cloud_private_data_source_connect_network.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ data "grafana_cloud_stack" "current" {
2727
}
2828
2929
resource "grafana_cloud_private_data_source_connect_network" "test" {
30-
region = "us"
30+
region = "prod-us-east-0"
3131
name = "my-pdc"
3232
display_name = "My PDC"
3333
stack_identifier = data.grafana_cloud_stack.current.id

docs/resources/cloud_private_data_source_connect_network_token.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ data "grafana_cloud_stack" "current" {
2727
}
2828
2929
resource "grafana_cloud_private_data_source_connect_network" "test" {
30-
region = "us"
30+
region = "prod-us-east-0"
3131
name = "my-pdc"
3232
display_name = "My PDC"
3333
stack_identifier = data.grafana_cloud_stack.current.id

docs/resources/synthetic_monitoring_installation.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,7 @@ variable "cloud_access_policy_token" {
3535
}
3636
variable "stack_slug" {}
3737
variable "cloud_region" {
38-
default = "us"
38+
default = "prod-us-east-0"
3939
}
4040
4141
// Step 1: Create a stack

examples/provider/provider-cloud.tf

+1-1
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ resource "grafana_cloud_stack" "my_stack" {
99

1010
name = "myteststack"
1111
slug = "myteststack"
12-
region_slug = "us"
12+
region_slug = "prod-us-east-0"
1313
}
1414

1515
// Step 2: Create a service account and key for the stack

examples/resources/grafana_cloud_access_policy/resource.tf

+2-2
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ data "grafana_cloud_organization" "current" {
33
}
44

55
resource "grafana_cloud_access_policy" "test" {
6-
region = "us"
6+
region = "prod-us-east-0"
77
name = "my-policy"
88
display_name = "My Policy"
99

@@ -20,7 +20,7 @@ resource "grafana_cloud_access_policy" "test" {
2020
}
2121

2222
resource "grafana_cloud_access_policy_token" "test" {
23-
region = "us"
23+
region = "prod-us-east-0"
2424
access_policy_id = grafana_cloud_access_policy.test.policy_id
2525
name = "my-policy-token"
2626
display_name = "My Policy Token"

examples/resources/grafana_cloud_access_policy_token/resource.tf

+2-2
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ data "grafana_cloud_organization" "current" {
33
}
44

55
resource "grafana_cloud_access_policy" "test" {
6-
region = "us"
6+
region = "prod-us-east-0"
77
name = "my-policy"
88
display_name = "My Policy"
99

@@ -20,7 +20,7 @@ resource "grafana_cloud_access_policy" "test" {
2020
}
2121

2222
resource "grafana_cloud_access_policy_token" "test" {
23-
region = "us"
23+
region = "prod-us-east-0"
2424
access_policy_id = grafana_cloud_access_policy.test.policy_id
2525
name = "my-policy-token"
2626
display_name = "My Policy Token"

examples/resources/grafana_cloud_private_data_source_connect_network/resource.tf

+1-1
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ data "grafana_cloud_stack" "current" {
33
}
44

55
resource "grafana_cloud_private_data_source_connect_network" "test" {
6-
region = "us"
6+
region = "prod-us-east-0"
77
name = "my-pdc"
88
display_name = "My PDC"
99
stack_identifier = data.grafana_cloud_stack.current.id

examples/resources/grafana_cloud_private_data_source_connect_network_token/resource.tf

+1-1
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ data "grafana_cloud_stack" "current" {
33
}
44

55
resource "grafana_cloud_private_data_source_connect_network" "test" {
6-
region = "us"
6+
region = "prod-us-east-0"
77
name = "my-pdc"
88
display_name = "My PDC"
99
stack_identifier = data.grafana_cloud_stack.current.id

examples/resources/grafana_synthetic_monitoring_installation/resource.tf

+1-1
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ variable "cloud_access_policy_token" {
33
}
44
variable "stack_slug" {}
55
variable "cloud_region" {
6-
default = "us"
6+
default = "prod-us-east-0"
77
}
88

99
// Step 1: Create a stack

internal/resources/cloud/data_source_cloud_access_policies_test.go

+7-7
Original file line numberDiff line numberDiff line change
@@ -30,11 +30,11 @@ func TestDataSourceAccessPolicy_Basic(t *testing.T) {
3030
"datadog:validate",
3131
}
3232

33-
accessPolicyConfig := testAccCloudAccessPolicyTokenConfigBasic(randomName, randomName+"display", "us", scopes, expiresAt)
33+
accessPolicyConfig := testAccCloudAccessPolicyTokenConfigBasic(randomName, randomName+"display", "prod-us-east-0", scopes, expiresAt)
3434
setItemMatcher := func(s *terraform.State) error {
3535
return resource.TestCheckTypeSetElemNestedAttrs("data.grafana_cloud_access_policies.test", "access_policies.*", map[string]string{
3636
"id": *policy.Id,
37-
"region": "us",
37+
"region": "prod-us-east-0",
3838
"name": randomName,
3939
"display_name": randomName + "display",
4040
"status": *policy.Status,
@@ -43,7 +43,7 @@ func TestDataSourceAccessPolicy_Basic(t *testing.T) {
4343

4444
resource.ParallelTest(t, resource.TestCase{
4545
ProtoV5ProviderFactories: testutils.ProtoV5ProviderFactories,
46-
CheckDestroy: testAccCloudAccessPolicyCheckDestroy("us", &policy),
46+
CheckDestroy: testAccCloudAccessPolicyCheckDestroy("prod-us-east-0", &policy),
4747
Steps: []resource.TestStep{
4848
// Test without filters
4949
{
@@ -70,23 +70,23 @@ func TestDataSourceAccessPolicy_Basic(t *testing.T) {
7070
},
7171
// Test with region filter
7272
{
73-
Config: accessPolicyConfig + testAccDataSourceAccessPoliciesConfigBasic(nil, common.Ref("us")),
73+
Config: accessPolicyConfig + testAccDataSourceAccessPoliciesConfigBasic(nil, common.Ref("prod-us-east-0")),
7474
Check: resource.ComposeTestCheckFunc(
7575
testAccCloudAccessPolicyCheckExists("grafana_cloud_access_policy.test", &policy),
7676

7777
resource.TestCheckNoResourceAttr("data.grafana_cloud_access_policies.test", "name_filter"),
78-
resource.TestCheckResourceAttr("data.grafana_cloud_access_policies.test", "region_filter", "us"),
78+
resource.TestCheckResourceAttr("data.grafana_cloud_access_policies.test", "region_filter", "prod-us-east-0"),
7979
setItemMatcher,
8080
),
8181
},
8282
// Test with name and region filter
8383
{
84-
Config: accessPolicyConfig + testAccDataSourceAccessPoliciesConfigBasic(&randomName, common.Ref("us")),
84+
Config: accessPolicyConfig + testAccDataSourceAccessPoliciesConfigBasic(&randomName, common.Ref("prod-us-east-0")),
8585
Check: resource.ComposeTestCheckFunc(
8686
testAccCloudAccessPolicyCheckExists("grafana_cloud_access_policy.test", &policy),
8787

8888
resource.TestCheckResourceAttr("data.grafana_cloud_access_policies.test", "name_filter", randomName),
89-
resource.TestCheckResourceAttr("data.grafana_cloud_access_policies.test", "region_filter", "us"),
89+
resource.TestCheckResourceAttr("data.grafana_cloud_access_policies.test", "region_filter", "prod-us-east-0"),
9090
resource.TestCheckResourceAttr("data.grafana_cloud_access_policies.test", "access_policies.#", "1"),
9191
setItemMatcher,
9292
),

internal/resources/cloud/resource_cloud_access_policy_token_test.go

+8-8
Original file line numberDiff line numberDiff line change
@@ -48,12 +48,12 @@ func TestResourceAccessPolicyToken_Basic(t *testing.T) {
4848
resource.Test(t, resource.TestCase{
4949
ProtoV5ProviderFactories: testutils.ProtoV5ProviderFactories,
5050
CheckDestroy: resource.ComposeTestCheckFunc(
51-
testAccCloudAccessPolicyCheckDestroy("us", &policy),
52-
testAccCloudAccessPolicyTokenCheckDestroy("us", &policyToken),
51+
testAccCloudAccessPolicyCheckDestroy("prod-us-east-0", &policy),
52+
testAccCloudAccessPolicyTokenCheckDestroy("prod-us-east-0", &policyToken),
5353
),
5454
Steps: []resource.TestStep{
5555
{
56-
Config: testAccCloudAccessPolicyTokenConfigBasic(initialName, "", "us", initialScopes, expiresAt),
56+
Config: testAccCloudAccessPolicyTokenConfigBasic(initialName, "", "prod-us-east-0", initialScopes, expiresAt),
5757
Check: resource.ComposeTestCheckFunc(
5858
testAccCloudAccessPolicyCheckExists("grafana_cloud_access_policy.test", &policy),
5959
testAccCloudAccessPolicyTokenCheckExists("grafana_cloud_access_policy_token.test", &policyToken),
@@ -76,15 +76,15 @@ func TestResourceAccessPolicyToken_Basic(t *testing.T) {
7676
),
7777
},
7878
{
79-
Config: testAccCloudAccessPolicyTokenConfigBasic(initialName, "", "us", initialScopes, expiresAt),
79+
Config: testAccCloudAccessPolicyTokenConfigBasic(initialName, "", "prod-us-east-0", initialScopes, expiresAt),
8080
PreConfig: func() {
8181
orgID, err := strconv.ParseInt(*policy.OrgId, 10, 32)
8282
if err != nil {
8383
t.Fatal(err)
8484
}
8585
client := testutils.Provider.Meta().(*common.Client).GrafanaCloudAPI
8686
_, _, err = client.TokensAPI.DeleteToken(context.Background(), *policyToken.Id).
87-
Region("us").
87+
Region("prod-us-east-0").
8888
OrgId(int32(orgID)).
8989
XRequestId("deleting-token").Execute()
9090
if err != nil {
@@ -93,7 +93,7 @@ func TestResourceAccessPolicyToken_Basic(t *testing.T) {
9393
},
9494
},
9595
{
96-
Config: testAccCloudAccessPolicyTokenConfigBasic(initialName, "updated", "us", updatedScopes, expiresAt),
96+
Config: testAccCloudAccessPolicyTokenConfigBasic(initialName, "updated", "prod-us-east-0", updatedScopes, expiresAt),
9797
Check: resource.ComposeTestCheckFunc(
9898
testAccCloudAccessPolicyCheckExists("grafana_cloud_access_policy.test", &policy),
9999
testAccCloudAccessPolicyTokenCheckExists("grafana_cloud_access_policy_token.test", &policyToken),
@@ -112,7 +112,7 @@ func TestResourceAccessPolicyToken_Basic(t *testing.T) {
112112
},
113113
// Recreate
114114
{
115-
Config: testAccCloudAccessPolicyTokenConfigBasic(updatedName, "updated", "us", updatedScopes, expiresAt),
115+
Config: testAccCloudAccessPolicyTokenConfigBasic(updatedName, "updated", "prod-us-east-0", updatedScopes, expiresAt),
116116
Check: resource.ComposeTestCheckFunc(
117117
testAccCloudAccessPolicyCheckExists("grafana_cloud_access_policy.test", &policy),
118118
testAccCloudAccessPolicyTokenCheckExists("grafana_cloud_access_policy_token.test", &policyToken),
@@ -152,7 +152,7 @@ func TestResourceAccessPolicyToken_NoExpiration(t *testing.T) {
152152
ProtoV5ProviderFactories: testutils.ProtoV5ProviderFactories,
153153
Steps: []resource.TestStep{
154154
{
155-
Config: testAccCloudAccessPolicyTokenConfigBasic(randomName, "", "us", []string{"metrics:read"}, ""),
155+
Config: testAccCloudAccessPolicyTokenConfigBasic(randomName, "", "prod-us-east-0", []string{"metrics:read"}, ""),
156156
Check: resource.ComposeTestCheckFunc(
157157
testAccCloudAccessPolicyCheckExists("grafana_cloud_access_policy.test", &policy),
158158
testAccCloudAccessPolicyTokenCheckExists("grafana_cloud_access_policy_token.test", &policyToken),

internal/resources/cloud/resource_private_data_source_connect_network_token_test.go

+3-3
Original file line numberDiff line numberDiff line change
@@ -27,12 +27,12 @@ func TestResourcePrivateDataSourceConnectNetworkToken_Basic(t *testing.T) {
2727
resource.Test(t, resource.TestCase{
2828
ProtoV5ProviderFactories: testutils.ProtoV5ProviderFactories,
2929
CheckDestroy: resource.ComposeTestCheckFunc(
30-
testAccCloudAccessPolicyCheckDestroy("us", &pdcNetwork),
31-
testAccCloudAccessPolicyTokenCheckDestroy("us", &pdcNetworkToken),
30+
testAccCloudAccessPolicyCheckDestroy("prod-us-east-0", &pdcNetwork),
31+
testAccCloudAccessPolicyTokenCheckDestroy("prod-us-east-0", &pdcNetworkToken),
3232
),
3333
Steps: []resource.TestStep{
3434
{
35-
Config: testAccCloudPrivateDataSourceConnectNetworkConfigBasic(initialName, "", "us"),
35+
Config: testAccCloudPrivateDataSourceConnectNetworkConfigBasic(initialName, "", "prod-us-east-0"),
3636
Check: resource.ComposeTestCheckFunc(
3737
testAccCloudAccessPolicyCheckExists("grafana_cloud_access_policy.test", &pdcNetwork),
3838
testAccCloudAccessPolicyTokenCheckExists("grafana_cloud_access_policy_token.test", &pdcNetworkToken),

0 commit comments

Comments
 (0)