From 0235728aafec57fb3e3a6316adb6cb2c6573d752 Mon Sep 17 00:00:00 2001 From: Rupal Sharma <152851038+Rupalgw@users.noreply.github.com> Date: Tue, 20 Feb 2024 11:38:40 +0530 Subject: [PATCH] fix:change in count condition (#4) --- outputs.tf | 12 ++++++------ 1 file changed, 6 insertions(+), 6 deletions(-) diff --git a/outputs.tf b/outputs.tf index af294aa..5da601f 100644 --- a/outputs.tf +++ b/outputs.tf @@ -1,24 +1,24 @@ output "sentinel_id" { - value = join("", azurerm_sentinel_log_analytics_workspace_onboarding.main.*.id) + value = try(azurerm_sentinel_log_analytics_workspace_onboarding.main[0].id, null) description = "The ID of the Security Insights Sentinel Onboarding States." } output "iot_id" { - value = join("", azurerm_sentinel_data_connector_iot.main.*.id) + value = try(azurerm_sentinel_data_connector_iot.main[0].id, null) description = "The ID of the Iot Data Connector." } output "security_center_id" { - value = join("", azurerm_sentinel_data_connector_azure_security_center.main.*.id) + value = try(azurerm_sentinel_data_connector_azure_security_center.main[0].id, null) description = "The ID of the Azure Security Center Data Connector." } output "dtc_ad_id" { - value = join("", azurerm_sentinel_data_connector_azure_active_directory.main.*.id) + value = try(azurerm_sentinel_data_connector_azure_active_directory.main[0].id, null) description = " The ID of the Azure Active Directory Data Connector." } output "dtc_threat_protection_id" { - value = join("", azurerm_sentinel_data_connector_azure_advanced_threat_protection.main.*.id) + value = try(azurerm_sentinel_data_connector_azure_advanced_threat_protection.main[0].id, null) description = "The ID of the Azure Advanced Threat Protection Data Connector." } output "dtc_ms_cloud_app_security_id" { - value = join("", azurerm_sentinel_data_connector_microsoft_cloud_app_security.main.*.id) + value = try(azurerm_sentinel_data_connector_microsoft_cloud_app_security.main[0].id, null) description = "The ID of the Microsoft Cloud App Security Data Connector." }